CTA News
Tell us a little about yourself. What was your background before coming to CTA? Prior to joining the CTA in February 2017, I served as a Special Assistant to President Obama and as Cybersecurity Coordinator on the National Security Council Staff. In this role, I was responsible for leading… Read More
The Industry
Co-authored by Neil Jenkins and Natasha Cohen In May 2018, Cisco Talos shared threat indicators and analysis with other CTA members around a new threat: VPNFilter. VPNFilter is a sophisticated modular malware system that targeted networking equipment, ultimately infecting at least 500,000 devices at its peak. Its activity was… Read More
CTA News
On May 23, 2018, Cisco’s Talos Intelligence Group publicly exposed a new malware threat they dubbed VPNFilter. VPNFilter is a sophisticated modular malware system targeting networking equipment all over the world. This malware allowed for theft of website credentials, collection of data, injection of malicious content into network traffic… Read More
The Industry
In April, we blogged about CTA’s role in disrupting malicious cyber activity. We introduced the idea of routinely bringing our members together to develop Joint Analysis reports on specific threats and campaign activity, the same way our early members came together to report on the threat from Cryptowall… Read More
The Industry
On May 23, 2018, Cisco’s Talos Group released a blog on a new sophisticated modular malware system called “VPNFilter.” This malware is targeting networking equipment all over the world and has recently begun a large-scale infection of devices in Ukraine. VPNFilter is troubling for a number of reasons, as… Read More
Best Practices
CTA was absolutely thrilled to have recently celebrated our first anniversary just a few weeks ago during the RSA Conference. We highlighted strong growth in membership, in staff, and in the amount of cyber threat information we shared at machine speed on a daily basis. Our first year… Read More
Best Practices
Since our founding last year, we’ve been busy. Our membership has more than doubled by growing from six to seventeen members; sharing on the platform has increased in terms of total volume and in the amount of context included; and we have built up our staff to support the mission. We’ve… Read More
Best Practices
Previously in this series of blog posts, we discussed the steps that organizations can use to improve their cybersecurity and we looked at how cybersecurity companies need to share information to enable more effective network defense. When cybersecurity companies share contextualized technical indicators at speed and at scale and use… Read More
Best Practices
We have often joked that after 20 years of talking about information sharing, we finally decided to start doing it. And now that we’re actually trying to do it, we realize why we spent 20 years talking about it. It’s much easier to talk about it! In our first… Read More
Best Practices
In our post last month, we talked about what companies need to do internally to adopt a holistic, long-term risk management approach to cybersecurity. The big takeaways were five steps companies can take to drive down their individual cybersecurity risks to a more manageable level. If more companies implemented… Read More