Skip to content
Cyber Threat Alliance
  • About CTA
    • Who We Are
    • Board of Directors
    • Our Sharing Model
    • Testimonials
  • Membership
  • Partnerships
  • News
  • Events
  • Resources
    • Assets
    • Webinars
    • Recommended Resources
    • Member Shares
  • Blog
Search

Assets

Home » Resources » Assets

CTA in Focus (December 2025)

CTA in Focus (September 2025)

Approaching Quantum Dawn: Closing the Cybersecurity Readiness Gap Before It’s Too Late Joint Analytic Report

CTA in Focus (June 2025)

CTA in Focus (March 2025)

Cybersecurity in the Age of Generative AI Joint Analytic Report – Part II, Navigating Cyber Threats to GenAI Systems

Cybersecurity in the Age of Generative AI Joint Analytic Report – Part I, Combating GenAI Assisted Cyber Threats

CTA in Focus (December 2024)

CTA in Focus (September 2024)

CTA 2024 Summer Olympics Threat Assessment (July 2024)

CTA in Focus (June 2024)

Cyber Threats to NGOs

CTA in Focus (March 2024)

CTA in Focus (December 2023)

CTA in Focus (September 2023)

How Emerging Technologies Threaten Our Cybersecurity

CTA in Focus (June 2023)

CTA at a Glance

CTA in Focus (March 2023)

How to Bake Cybersecurity Regulations: Ingredients for Better Results

Cyber Incident Reporting Framework: Global Edition

CTA in Focus (December 2022)

Cyber Incident Reporting Framework

CTA Value Proposition

CTA in Focus (September 2022)

CTA Partnership Programs

CTA in Focus (June 2022)

CTA in Focus (March 2022)

CTA in Focus (December 2021)

CTA Membership Admission Requirements

CTA in Focus (September 2021)

Closing the Gap: Expanding Cyber Deterrence

CTA In Focus (June 2021)

Updated CTA 2020 Summer Olympics Threat Assessment (May 2021)

CTA In Focus (March 2021)

CTA Threat Intelligence Sharing

CTA Overview: What Is The Cyber Threat Alliance?

CTA Solutions Fact Sheet

CTA Infographic

CTA In Focus (December 2020)

CTA in Focus (September 2020)

CTA in Focus (June 2020)

CTA in Focus (March 2020)

Joint Analysis on Securing Edge Devices

Illicit CryptoMining Whitepaper

Key Findings: The Illicit Cryptocurrency Mining Threat

Adversary Playbook Principles

Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat

Cyber Threat Alliance
  • Facebook
  • YouTube
  • Linked In
  • About CTA
    • Who We Are
    • Board of Directors
    • Testimonials
    • Our Sharing Model
  • Membership
  • News
  • Partnerships
  • Resources
  • Contact

© Copyright 2026 Cyber Threat Alliance | Web Development by Beam & Hinge