81-90 of about 94 Results
Sort by:

81-90 of about 94 Results



  • All
  • Best Practices
  • CTA News
  • Guest Blogs
  • Major Incidents
  • Member Spotlight
  • The Industry


  • All Authors
  • Cyber Threat Alliance
  • Jeannette Jarvis
  • Jason Minnick
  • Michael Daniel
  • Neil Jenkins


  • All
  • 2020
  • Analysis
  • Avast
  • Blockchain
  • Board of Directors
  • Botnets
  • Check Point
  • + See All Issues
  • Cisco
  • COVID-19
  • Cryptomining
  • Crytocurrency
  • CTA
  • Cyber Hygiene
  • Cyber Threat
  • Cybercrime Support Network
  • Cybersecurity
  • Data
  • Early Sharing
  • Elections
  • Fortinet
  • Guest Blog
  • Hack
  • Incident Response
  • Intelligence Sharing
  • Internet of Things
  • Juniper
  • K7 Computing
  • Log4j
  • Meltdown
  • Microsoft Exchange
  • NTT
  • Olympics
  • Palo Alto Networks
  • Phishing
  • Platform
  • Ransomware
  • Ransomware Task Force
  • Rapid7
  • ReversingLabs
  • REvil
  • Scitum
  • SecurityScorecard
  • SolarWinds
  • Sophos
  • Spectre
  • STIX
  • Symantec
  • Threat Assessment
  • Threat Intelligence
  • Trust
  • Ukraine
  • Virus Bulletin
  • VPNFilter
  • WannaCry

Best Practices

CTA Embarks on Year #2: Enhancing our Operational Collaboration

CTA was absolutely thrilled to have recently celebrated our first anniversary just a few weeks ago during the RSA Conference. We highlighted strong growth in membership, in staff, and in the amount of cyber threat information we shared at machine speed on a daily basis. Our first year also provided the opportunity to test how […]

Best Practices

CTA’s Strategic Objectives: Protect. Disrupt. Elevate.

Since our founding last year, we’ve been busy. Our membership has more than doubled by growing from six to seventeen members; sharing on the platform has increased in terms of total volume and in the amount of context included; and we have built up our staff to support the mission. We’ve made our first forays into […]

Best Practices

Smarter Cybersecurity Thinking: Disruption Through Analysis

Previously in this series of blog posts, we discussed the steps that organizations can use to improve their cybersecurity and we looked at how cybersecurity companies need to share information to enable more effective network defense. When cybersecurity companies share contextualized technical indicators at speed and at scale and use those indicators in their products, […]

Best Practices

Smarter Cybersecurity Thinking: Create a Defensible Cyberspace Through Information Sharing

We have often joked that after 20 years of talking about information sharing, we finally decided to start doing it. And now that we’re actually trying to do it, we realize why we spent 20 years talking about it. It’s much easier to talk about it! In our first “Smarter Cybersecurity Thinking” blog post, we […]

Best Practices

Smarter Cybersecurity Thinking: What Companies Need to Consider Externally

In our post last month, we talked about what companies need to do internally to adopt a holistic, long-term risk management approach to cybersecurity. The big takeaways were five steps companies can take to drive down their individual cybersecurity risks to a more manageable level. If more companies implemented these actions to begin mitigating their […]

Guest Blogs

The Value of Collaborative Threat Intelligence Sharing

Written by Ken Xie, Fortinet, Founder, Chairman of the Board, and Chief Executive Officer (CEO) In today’s digital economy, speed and efficiency are essential. So is the ability to access data from anywhere and from any device. These demands are forcing the network to change, increasing the amount of data that networks need to manage […]

Best Practices

Smarter Cybersecurity Thinking: What Companies Need to do Internally

As we noted in a recent blog post, “The Smarter Way to Think About Cybersecurity,” many organizations subscribe to the myth that cybersecurity is a technical problem for which there should be a technical solution. This mindset is problematic because it drives companies to try to buy their way into being cyber secure. Companies search […]

CTA News

Growing the CTA Team

2017 was an important year for CTA: We hired our first full- time employees (myself included), welcomed eight new members into the organization, and have hit a milestone of sharing at least 65,000 STIX™ packages per day on the platform. As we look to increase our footprint within the industry in 2018, we have brought […]

Best Practices

Smarter Cybersecurity Thinking: Change your Mindset to Even the Odds

Cybersecurity is undoubtedly one of the most challenging issues of the 21st century. It now tops the Director of National Intelligence’s Worldwide Threat Assessment, and the World Economic Forum recently declared that a cyber disaster could be more costly than a major hurricane. And yet, although we have invested huge amounts of time and money […]

The Industry

Meltdown and Spectre: What you need to know from CTA

In recent weeks, critical vulnerabilities in modern computer processors were disclosed that affect nearly every piece of computing hardware currently in use. These vulnerabilities, known as Meltdown and Spectre, could be used to allow an attacker to access sensitive information stored in the memory of programs running on your device. Microsoft released a Windows Security […]

1 7 8 9 10