Best Practices
We have often joked that after 20 years of talking about information sharing, we finally decided to start doing it. And now that we’re actually trying to do it, we realize why we spent 20 years talking about it. It’s much easier to talk about it! In our first…
Best Practices
In our post last month, we talked about what companies need to do internally to adopt a holistic, long-term risk management approach to cybersecurity. The big takeaways were five steps companies can take to drive down their individual cybersecurity risks to a more manageable level. If more companies implemented…
Guest Blogs
Written by Ken Xie, Fortinet, Founder, Chairman of the Board, and Chief Executive Officer (CEO) In today’s digital economy, speed and efficiency are essential. So is the ability to access data from anywhere and from any device. These demands are forcing the network to change, increasing the amount of data…
Best Practices
As we noted in a recent blog post, “The Smarter Way to Think About Cybersecurity,” many organizations subscribe to the myth that cybersecurity is a technical problem for which there should be a technical solution. This mindset is problematic because it drives companies to try to buy their way…
CTA News
2017 was an important year for CTA: We hired our first full- time employees (myself included), welcomed eight new members into the organization, and have hit a milestone of sharing at least 65,000 STIX™ packages per day on the platform. As we look to increase our footprint within the industry…
Best Practices
Cybersecurity is undoubtedly one of the most challenging issues of the 21st century. It now tops the Director of National Intelligence’s Worldwide Threat Assessment, and the World Economic Forum recently declared that a cyber…
The Industry
In recent weeks, critical vulnerabilities in modern computer processors were disclosed that affect nearly every piece of computing hardware currently in use. These vulnerabilities, known as Meltdown and Spectre, could be used to allow an attacker to access sensitive information stored in the memory of programs running on your device.
The Industry
Ransomware once again posed a major threat in 2017, as cyber criminals continued to demonstrate just how effective a tool it is to make money. But 2017 also saw ransomware evolve, as malicious actors combined ransomware with self-propagating worms with the intent to damage data and systems instead…
CTA News
The year has been marked by increasing cybercrime, numerous major global cyber attacks, and steadily rising risk to our critical infrastructure. Industry experts know these trends will only continue to worsen. Never has the need been greater for cybersecurity leaders to join forces to mitigate the major risks…
The Industry
It’s time for the cybersecurity industry to stop talking about information sharing. Before you get out the flamethrowers, though, let me add – it’s time for the cybersecurity industry to start doing information sharing. More specifically, the industry needs to share threat intelligence at speed…