• Cyber Threat Intelligence Sharing as a Force Multiplier

    Force Multiplication: Past and Present For millennia, military leaders have looked for new tactical and technological means of magnifying their existing strategic resources. Stronger armor, higher walls, and more reliable means of communication and navigation are all examples of innovation as ‘force multiplication.’ The historic consequences of these technologies have shaped empires, economies, and civilizations… View Article
  • 2020 Summer Olympics Threat Assessment

    This blog is authored by Neil Jenkins (CTA) and Kendall McKay (Cisco Talos, and lead author on the Threat Assessment) Today, the Cyber Threat Alliance (CTA) released the 2020 Summer Olympics Threat Assessment, our first event-specific threat report focused on cyber risks to this summer’s Tokyo Games. This report was written by CTA’s Olympics Cybersecurity… View Article
  • Are You Ready for the Evolution of Ransomware?

    Ransomware once again posed a major threat in 2017, as cyber criminals continued to demonstrate just how effective a tool it is to make money. But 2017 also saw ransomware evolve, as malicious actors combined ransomware with self-propagating worms with the intent to damage data and systems instead of just seeking ransom demands. This new… View Article