• Cyber Threat Intelligence Sharing as a Force Multiplier

    Force Multiplication: Past and Present For millennia, military leaders have looked for new tactical and technological means of magnifying their existing strategic resources. Stronger armor, higher walls, and more reliable means of communication and navigation are all examples of innovation as ‘force multiplication.’ The historic consequences of these technologies have shaped empires, economies, and civilizations… View Article
  • Adopting an Industry Data Format Standard: Fact or Fiction?

    In the landscape of threat intelligence, there are many challenges. Of these challenges, data format should not be one of them. However, it is. As many already know, proprietary data formats cause both integration and scalability issues. In today’s market of seemingly endless cyber security solutions, data interoperability is paramount and we as an industry… View Article
  • Cybersecurity and Working From Home: Tips & Resources

    Earlier this week, CTA announced that we would join 12 other non-profit organizations to support the Global Cyber Alliance “Work From Home. Secure Your Business.” campaign. This effort is focused on shoring up the defenses of a newly remote workforce during the ongoing disruption to our regular lives as a result of the COVID-19 pandemic…. View Article