Best Practices

Responsibility Doesn’t End With Disclosure

By Michael Daniel, CTA President & CEO For years, the cybersecurity community argued about how researchers should disclose newly discovered vulnerabilities in information technology products, as well as how companies should handle being told about vulnerabilities in their products.  After considerable debate and not a little rancor, the industry settled…

Best Practices

Get to Know PAUL B and Stay Secure in 2023

Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic, to coping with the fallout of high-profile breaches of national infrastructure such as…

Best Practices

3 Aspects to Managing Systemic Cyber Risk

This blog on the importance of managing systemic cyber risk is reposted with permission from NETSCOUT, a Contributing Member of the Cyber Threat Alliance. This blog was authored by Michael Daniel, CTA President and CEO, as a guest posting for NETSCOUT’s blog. Cyberspace enables connections, whether between individuals, organizations,…

Best Practices

Cybersecurity Awareness Month – Shoring Up Your Phishing Defenses

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance  From ransomware to SolarWinds, the cybersecurity space has been as hectic as ever over the last 12-24 months. However, for all of the emerging threats that are cropping up on the horizon, phishing — one of the…

Best Practices

Cybersecurity Awareness Month – Getting Familiar with Cyber Basics

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Get Familiar with the Cyber Basics At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks…

Best Practices

Government Handling of Zero-Days: More Sunlight, Fewer Shadows

This post was originally authored by Josh Kenway. To say the least, 2020 was a turbulent year. While certain governments responded to the spread of COVID-19 more effectively than others, the pandemic’s disruptive impact on human society is sure to linger well into this new decade. The paramount importance of…

Best Practices

Get Your Spidey Sense On

This blog on the importance of staying vigilant online is reposted with permission from the Global Cyber Alliance (GCA). GCA is an international, cross-sector effort dedicated to reducing cyber risk and improving our connected world and we are delighted to be able to work with them as one of our…

Best Practices

Cyber Threat Intelligence Sharing as a Force Multiplier

Force Multiplication: Past and Present For millennia, military leaders have looked for new tactical and technological means of magnifying their existing strategic resources. Stronger armor, higher walls, and more reliable means of communication and navigation are all examples of innovation as ‘force multiplication.’ The historic consequences of these technologies have…

Best Practices

Adopting an Industry Data Format Standard: Fact or Fiction?

In the landscape of threat intelligence, there are many challenges. Of these challenges, data format should not be one of them. However, it is. As many already know, proprietary data formats cause both integration and scalability issues. In today’s market of seemingly endless cyber security solutions, data interoperability is…