Guest Blogs
Written by Carol Hildebrand, Senior Writer, Security, NETSCOUT The COVID-19 pandemic handed some Herculean tasks to many enterprise IT and cybersecurity teams. First, IT had to adjust architectures and practices to support a massive, unplanned shift to remote work for those who were able to work at home. Many companies…
Guest Blogs
Written by Jon-Louis Heimerl, CISSP, Sr. Manager, Threat Intelligence Communications, NTT Ltd. As 2020 drew to a close, NTT Ltd worked on our annual Global Threat Intelligence Report (GTIR). The data showed some interesting results, so I asked Michael Daniel what kind of impact he thought COVID-19 was having on…
Guest Blogs
Written by Derek Manky, Chief of Security Insights & Global Threat Alliances, Fortinet’s FortiGuard Labs With the 4th anniversary of the Cyber Threat Alliance (CTA) having just occurred, I got to thinking about how the CTA started. Not with the incorporation of the organization in 2017, but with the…
Guest Blogs
Written by Ryan Olson, VP Threat Intelligence (Unit 42), Palo Alto Networks When Palo Alto Networks and Fortinet co-founded the Cyber Threat Alliance (CTA) in 2014, which eventually incorporated on January 23, 2017, I would have never guessed years later there would be 30+ members. It’s a significant accomplishment…
Guest Blogs
Written by Scott Lambert, VP of Threat Research, ReversingLabs In 2018, Kirstjen Nielsen, then secretary of the Department of Homeland Security (DHS), spoke at the first-ever National Cyber Security Summit in New York City, where she gave a stark overview of the cyberthreats facing the United States. Her message…
Guest Blogs
Although nation-state activities in cyberspace often grab the headlines, the majority of malicious cyberactivity comes from cybercrime. CTA members spend a lot of time and money combating this problem. That’s one reason why we work with organizations like the Cybercrime Support Network to reduce the effects of cybercrime on…
Guest Blogs
Please join us for a keynote address from Sophos CTO, Joe Levy, at Virus Bulletin 2020: “Collaborating with Competitors: A Better Strategy to Beat Adversaries.” The keynote goes live on Wednesday, Sept. 28, 2020, at 12 noon ET. Read on for a preview of what to expect. Written by…
Guest Blogs
Written by Mounir Hahad, Head of Juniper Threat Labs, Juniper Networks Cybersecurity is such a vast and complicated space that it is nearly impossible to defend all of your customers from all of the potential threats bad actors are creating and modifying to attack a network without help from third…
Guest Blogs
Written by the SCILabs Team The story… It appeared that it would be a quiet Friday for our Incident Response Team; it was almost the end of the day, time to rest, suddenly the phone rang… “We need your help; a key customer is having an incident.” From then on…
Guest Blogs
Written by Jeremy Nichols, Director, Intelligence Fusion & Analytics CTA: Growing and Maturing Through Collaboration CTA membership has allowed the NTT Global Threat Intelligence Center (GTIC) to continue to mature our research, threat hunting and intelligence dissemination processes through automated and manual intelligence sharing between members. We’ve been busy migrating…