Best Practices
Since our founding last year, we’ve been busy. Our membership has more than doubled by growing from six to seventeen members; sharing on the platform has increased in terms of total volume and in the amount of context included; and we have built up our staff to support the mission. We’ve… Read More
Best Practices
Previously in this series of blog posts, we discussed the steps that organizations can use to improve their cybersecurity and we looked at how cybersecurity companies need to share information to enable more effective network defense. When cybersecurity companies share contextualized technical indicators at speed and at scale and use… Read More
Best Practices
We have often joked that after 20 years of talking about information sharing, we finally decided to start doing it. And now that we’re actually trying to do it, we realize why we spent 20 years talking about it. It’s much easier to talk about it! In our first… Read More
Best Practices
In our post last month, we talked about what companies need to do internally to adopt a holistic, long-term risk management approach to cybersecurity. The big takeaways were five steps companies can take to drive down their individual cybersecurity risks to a more manageable level. If more companies implemented… Read More
Guest Blogs
Written by Ken Xie, Fortinet, Founder, Chairman of the Board, and Chief Executive Officer (CEO) In today’s digital economy, speed and efficiency are essential. So is the ability to access data from anywhere and from any device. These demands are forcing the network to change, increasing the amount of data… Read More
Best Practices
As we noted in a recent blog post, “The Smarter Way to Think About Cybersecurity,” many organizations subscribe to the myth that cybersecurity is a technical problem for which there should be a technical solution. This mindset is problematic because it drives companies to try to buy their way… Read More
CTA News
2017 was an important year for CTA: We hired our first full- time employees (myself included), welcomed eight new members into the organization, and have hit a milestone of sharing at least 65,000 STIX™ packages per day on the platform. As we look to increase our footprint within the industry… Read More
Best Practices
Cybersecurity is undoubtedly one of the most challenging issues of the 21st century. It now tops the Director of National Intelligence’s Worldwide Threat Assessment, and the World Economic Forum recently declared that a cyber… Read More
The Industry
In recent weeks, critical vulnerabilities in modern computer processors were disclosed that affect nearly every piece of computing hardware currently in use. These vulnerabilities, known as Meltdown and Spectre, could be used to allow an attacker to access sensitive information stored in the memory of programs running on your device. Read More
The Industry
Ransomware once again posed a major threat in 2017, as cyber criminals continued to demonstrate just how effective a tool it is to make money. But 2017 also saw ransomware evolve, as malicious actors combined ransomware with self-propagating worms with the intent to damage data and systems instead… Read More