Guest Blogs
Written by Mounir Hahad, Head of Juniper Threat Labs, Juniper Networks Cybersecurity is such a vast and complicated space that it is nearly impossible to defend all of your customers from all of the potential threats bad actors are creating and modifying to attack a network without help from third…
CTA News
On September 9th, CTA reached a major milestone for our automated sharing program. Since our founding as an independent non-profit in 2017, CTA member companies have shared over 100 million cyber threat observables. Although it may seem banal in some ways, this simple statistic represents an enormous accomplishment in its…
Best Practices
In the landscape of threat intelligence, there are many challenges. Of these challenges, data format should not be one of them. However, it is. As many already know, proprietary data formats cause both integration and scalability issues. In today’s market of seemingly endless cyber security solutions, data interoperability is…
Guest Blogs
Written by the SCILabs Team The story… It appeared that it would be a quiet Friday for our Incident Response Team; it was almost the end of the day, time to rest, suddenly the phone rang… “We need your help; a key customer is having an incident.” From then on…
The Industry
2020 is halfway over. Many people will see this milestone as a good thing. In fact, most people would probably say that 2020 cannot be over fast enough. Even for a virtual organization in an industry not severely damaged by the pandemic, CTA has faced some real challenges during 2020.
Guest Blogs
Written by Jeremy Nichols, Director, Intelligence Fusion & Analytics CTA: Growing and Maturing Through Collaboration CTA membership has allowed the NTT Global Threat Intelligence Center (GTIC) to continue to mature our research, threat hunting and intelligence dissemination processes through automated and manual intelligence sharing between members. We’ve been busy migrating…
Guest Blogs
Written by Joe Chen, Engineering, Security Technologies & All Endpoint Solutions, Broadcom Inc. After learning that Jeannette Jarvis and Michael Daniel wanted me to contribute a blog to the CTA site, I was excited to help. When CTA started, our goal was simple, to collaborate across the industry and share…
CTA News
This post was originally authored by Josh Kenway. Over the past two years, as I have worked towards a graduate degree focused on cybersecurity and digital policy at Stanford University, the variety and seeming intractability of numerous collective action problems in this broad domain has been a consistent curricular…
Guest Blogs
Written by Wade Woolwine, Principal Security Researcher, Rapid7 Five years ago, when Rapid7 connected with the Cyber Threat Alliance (CTA), we had just started our entry into the incident detection and response space. With our background in offensive security, we naturally gravitated to detecting threats through user accounts and attacker…
CTA News
“The relationships I and my team have built with the people in other members’ intelligence teams was an unexpected benefit. CTA has enabled us to collaborate within a trusted environment and build independent relationships that make that collaboration even more effective.” – Ryan Olson, Vice President Threat Intelligence (Unit 42),…