Guest Blogs

4 Post-Pandemic Cybersecurity Trends

Written by Carol Hildebrand, Senior Writer, Security, NETSCOUT The COVID-19 pandemic handed some Herculean tasks to many enterprise IT and cybersecurity teams.  First, IT had to adjust architectures and practices to support a massive, unplanned shift to remote work for those who were able to work at home. Many companies…

Guest Blogs

Pandemic Acceleration: the changing relationship with web-based technology

Written by Jon-Louis Heimerl, CISSP, Sr. Manager, Threat Intelligence Communications, NTT Ltd. As 2020 drew to a close, NTT Ltd worked on our annual Global Threat Intelligence Report (GTIR). The data showed some interesting results, so I asked Michael Daniel what kind of impact he thought COVID-19 was having on…

Guest Blogs

A Matter of Trust

Written by Derek Manky, Chief of Security Insights & Global Threat Alliances, Fortinet’s FortiGuard Labs With the 4th anniversary of the Cyber Threat Alliance (CTA) having just occurred, I got to thinking about how the CTA started. Not with the incorporation of the organization in 2017, but with the…

Guest Blogs

Fighting Malware Means Strength in Numbers

Written by Scott Lambert, VP of Threat Research, ReversingLabs In 2018, Kirstjen Nielsen, then secretary of the Department of Homeland Security (DHS), spoke at the first-ever National Cyber Security Summit in New York City, where she gave a stark overview of the cyberthreats facing the United States. Her message…

Guest Blogs

Support for Cybercrime Victims: The US Is Playing Catch Up

Although nation-state activities in cyberspace often grab the headlines, the majority of malicious cyberactivity comes from cybercrime.  CTA members spend a lot of time and money combating this problem.  That’s one reason why we work with organizations like the Cybercrime Support Network to reduce the effects of cybercrime on…

Guest Blogs

Collaborating with Competitors: A Better Strategy to Beat Adversaries

Please join us for a keynote address from Sophos CTO, Joe Levy, at Virus Bulletin 2020: “Collaborating with Competitors: A Better Strategy to Beat Adversaries.” The keynote goes live on Wednesday, Sept. 28, 2020, at 12 noon ET. Read on for a preview of what to expect.   Written by…

Guest Blogs

Keeping the House Safe: How Collaboration with CTA Makes It Possible

Written by Mounir Hahad, Head of Juniper Threat Labs, Juniper Networks Cybersecurity is such a vast and complicated space that it is nearly impossible to defend all of your customers from all of the potential threats bad actors are creating and modifying to attack a network without help from third…

Guest Blogs

CTA: The Value of Collaboration…

Written by the SCILabs Team The story… It appeared that it would be a quiet Friday for our Incident Response Team; it was almost the end of the day, time to rest, suddenly the phone rang… “We need your help; a key customer is having an incident.” From then on…

Guest Blogs

CTA: Growing and Maturing Through Collaboration

Written by Jeremy Nichols, Director, Intelligence Fusion & Analytics CTA: Growing and Maturing Through Collaboration CTA membership has allowed the NTT Global Threat Intelligence Center (GTIC) to continue to mature our research, threat hunting and intelligence dissemination processes through automated and manual intelligence sharing between members. We’ve been busy migrating…