• CTA: A Trusted Environment

    The Cyber Threat Alliance (CTA) Sharing Model relies on our organization’s status as a trusted environment for all of our private-sector members, as well as public sector and civil society partners. That trust also allows us to do so much more. The fact that all of CTA’s private-sector members have access to the same shared… View Article
  • Stronger Together

    In this blog post, we look at what our members have been saying, through guest blogs and profiles in CTA’s quarterly newsletter, about how we are delivering on the core aspects of our mission: protecting end users, disrupting malicious actors, and elevating overall security. The CTA community knows that we are stronger together. Read on to find… View Article
  • Data Diversity: The CTA Advantage

    Despite the general turbulence unleashed by the COVID-19 pandemic, CTA has continued over the last year to mature as an organization in terms of both our threat intelligence sharing and membership growth. Of course, these two aspects are closely intertwined. Because our membership rules require all CTA members to share, having more members from a… View Article