CTA News
The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we will explore in greater depth these various use cases and the common… Read More
Best Practices
This blog on the importance of staying vigilant online is reposted with permission from the Global Cyber Alliance (GCA). GCA is an international, cross-sector effort dedicated to reducing cyber risk and improving our connected world and we are delighted to be able to work with them as one of our… Read More
CTA News
Earlier this month, CTA was all-hands on deck for the virtual Virus Bulletin conference, aka. ‘vblocalhost,’ where we coordinated and sponsored the Threat Intelligence Practitioners’ Summit (TIPS). TIPS spanned a range of perspectives from different corners of the world and highlighted distinct approaches to threat intelligence. If you… Read More
The Industry
Cyber Threat Alliance CEO, Michael Daniel, recently sat down with Highwire PR to discuss what the cybersecurity industry should be doing in the run-up to the 2020 U.S. Presidential Election. You can find an excerpt of this interview below, or click here for the full discussion on the Highwire… Read More
Guest Blogs
Please join us for a keynote address from Sophos CTO, Joe Levy, at Virus Bulletin 2020: “Collaborating with Competitors: A Better Strategy to Beat Adversaries.” The keynote goes live on Wednesday, Sept. 28, 2020, at 12 noon ET. Read on for a preview of what to expect. Written by… Read More
CTA News
As CTA has developed over the last three years, it has done so with a philosophy of collaboration front-of-mind. CTA provides a venue for productive relationships among our members to emerge and grow. We believe that these kinds of relationships are important and can provide mutual value creation. This is… Read More
Best Practices
Force Multiplication: Past and Present For millennia, military leaders have looked for new tactical and technological means of magnifying their existing strategic resources. Stronger armor, higher walls, and more reliable means of communication and navigation are all examples of innovation as ‘force multiplication.’ The historic consequences of these technologies have… Read More
Guest Blogs
Written by Mounir Hahad, Head of Juniper Threat Labs, Juniper Networks Cybersecurity is such a vast and complicated space that it is nearly impossible to defend all of your customers from all of the potential threats bad actors are creating and modifying to attack a network without help from third… Read More
CTA News
On September 9th, CTA reached a major milestone for our automated sharing program. Since our founding as an independent non-profit in 2017, CTA member companies have shared over 100 million cyber threat observables. Although it may seem banal in some ways, this simple statistic represents an enormous accomplishment in its… Read More
Best Practices
In the landscape of threat intelligence, there are many challenges. Of these challenges, data format should not be one of them. However, it is. As many already know, proprietary data formats cause both integration and scalability issues. In today’s market of seemingly endless cyber security solutions, data interoperability is… Read More