21-30 of about 94 Results
Sort by:

21-30 of about 94 Results



  • All
  • Best Practices
  • CTA News
  • Guest Blogs
  • Major Incidents
  • Member Spotlight
  • The Industry


  • All Authors
  • Cyber Threat Alliance
  • Jeannette Jarvis
  • Jason Minnick
  • Michael Daniel
  • Neil Jenkins


  • All
  • 2020
  • Analysis
  • Avast
  • Blockchain
  • Board of Directors
  • Botnets
  • Check Point
  • + See All Issues
  • Cisco
  • COVID-19
  • Cryptomining
  • Crytocurrency
  • CTA
  • Cyber Hygiene
  • Cyber Threat
  • Cybercrime Support Network
  • Cybersecurity
  • Data
  • Early Sharing
  • Elections
  • Fortinet
  • Guest Blog
  • Hack
  • Incident Response
  • Intelligence Sharing
  • Internet of Things
  • Juniper
  • K7 Computing
  • Log4j
  • Meltdown
  • Microsoft Exchange
  • NTT
  • Olympics
  • Palo Alto Networks
  • Phishing
  • Platform
  • Ransomware
  • Ransomware Task Force
  • Rapid7
  • ReversingLabs
  • REvil
  • Scitum
  • SecurityScorecard
  • SolarWinds
  • Sophos
  • Spectre
  • STIX
  • Symantec
  • Threat Assessment
  • Threat Intelligence
  • Trust
  • Ukraine
  • Virus Bulletin
  • VPNFilter
  • WannaCry

Major Incidents

Incident Response Blog: Log4j

A zero-day vulnerability (CVE-2021-44228) has been discovered in Apache Log4j. Apache Log4j is a java-based logging utility. It is widely used in cloud and enterprise software services. Exploit code has been shared publicly and multiple actors are attempting to exploit the vulnerability. The vulnerability has the potential to allow unauthenticated remote code execution (RCE) on nearly […]

Guest Blogs

Cyber Threat Intelligence: Teaming Up for Ever More Secure Cybersecurity

Written by the TEHTRIS Team TEHTRIS understands that there is strength in numbers and has chosen to join the Cyber Threat Alliance, alongside other experts in the field, to share our unique, high value-added threat intelligence markers in order to contribute to a safer digital world. The professionalization of ransomware groups, the maturity of attackers, and […]

The Industry

How CTA Helps Turn Industry Fragmentation into a Strength

With each day, cyberspace grows larger, more complex, and more integral to our societies and economies. The increased dependence on the Internet means that incidents that would have been merely annoying fifteen years ago can now cause catastrophic damage. Cybersecurity has made a parallel transition, shifting from a “nice to have” to a “really should […]

Best Practices

3 Aspects to Managing Systemic Cyber Risk

This blog on the importance of managing systemic cyber risk is reposted with permission from NETSCOUT, a Contributing Member of the Cyber Threat Alliance. This blog was authored by Michael Daniel, CTA President and CEO, as a guest posting for NETSCOUT’s blog. Cyberspace enables connections, whether between individuals, organizations, governments, or some combination of the […]

Best Practices

Cybersecurity Awareness Month – Prioritizing Cybersecurity in a Hybrid Workplace

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Today, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market […]

Guest Blogs

The Power of Partnerships

Written by Devin Lynch, Senior Director, Policy & Government Affairs, SecurityScorecard As CISA’s 4th Annual National Cybersecurity Summit concludes this week, the theme for the final day is “The Power of Partnerships.” Before national cybersecurity month concludes, we should take a moment to join CISA and consider the power of partnerships. We all want the […]

Best Practices

Cybersecurity Awareness Month – Shoring Up Your Phishing Defenses

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance  From ransomware to SolarWinds, the cybersecurity space has been as hectic as ever over the last 12-24 months. However, for all of the emerging threats that are cropping up on the horizon, phishing — one of the oldest pain points in cybersecurity […]

Member Spotlight

CTA Board of Directors Spotlight: Dorit Dor, Check Point Software Technologies

As the digital world becomes a bigger part of all of our lives, cyber criminals are becoming more prevalent and working together (including state-sponsored attacks) to wreak havoc on all of us, amplifying the global cyber security problem. This global problem heightens the need to work together, share threat intelligence, and align strategies to better […]

Best Practices

Cybersecurity Awareness Month – Getting Familiar with Cyber Basics

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Get Familiar with the Cyber Basics At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and […]

CTA News

CTA’s Giant-Sized Anniversary Issue – Early Share #500

When you read superhero comics, you know something exciting is going to happen when you get an issue with a milestone number, like 100, 250, or 500. Those anniversary issues are always giant-sized and start or end a huge storyline (like Amazing Spider-Man #300, when Venom first appears and Spidey gets the blue and red […]

1 2 3 4 5 10