Best Practices
Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic, to coping with the fallout of high-profile breaches of national infrastructure such as…
Best Practices
This blog on the importance of managing systemic cyber risk is reposted with permission from NETSCOUT, a Contributing Member of the Cyber Threat Alliance. This blog was authored by Michael Daniel, CTA President and CEO, as a guest posting for NETSCOUT’s blog. Cyberspace enables connections, whether between individuals, organizations,…
Best Practices
By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Today, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are…
Best Practices
By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance From ransomware to SolarWinds, the cybersecurity space has been as hectic as ever over the last 12-24 months. However, for all of the emerging threats that are cropping up on the horizon, phishing — one of the…
Best Practices
By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Get Familiar with the Cyber Basics At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks…
Best Practices
This post was originally authored by Josh Kenway. To say the least, 2020 was a turbulent year. While certain governments responded to the spread of COVID-19 more effectively than others, the pandemic’s disruptive impact on human society is sure to linger well into this new decade. The paramount importance of…
Best Practices
This blog on the importance of staying vigilant online is reposted with permission from the Global Cyber Alliance (GCA). GCA is an international, cross-sector effort dedicated to reducing cyber risk and improving our connected world and we are delighted to be able to work with them as one of our…
Best Practices
Force Multiplication: Past and Present For millennia, military leaders have looked for new tactical and technological means of magnifying their existing strategic resources. Stronger armor, higher walls, and more reliable means of communication and navigation are all examples of innovation as ‘force multiplication.’ The historic consequences of these technologies have…
Best Practices
In the landscape of threat intelligence, there are many challenges. Of these challenges, data format should not be one of them. However, it is. As many already know, proprietary data formats cause both integration and scalability issues. In today’s market of seemingly endless cyber security solutions, data interoperability is…
Best Practices
Earlier this week, CTA announced that we would join 12 other non-profit organizations to support the Global Cyber Alliance “Work From Home. Secure Your Business.” campaign. This effort is focused on shoring up the defenses of a newly remote workforce during the ongoing disruption to our regular lives as…