Cyber Threat Alliance
@cyberalliance.bsky.social
CTA is a group of cybersecurity practitioners who work together to improve the overall security of the global digital ecosystem. We are stronger together. www.cyberthreatalliance.org
Our @cyberalliance.bsky.social member @telefonica-en.bsky.social discusses Automation in Cyber Security: are we ready?
"Automation isn’t the end of the road, it’s the beginning of a new way to defend ourselves."
telefonicatech.com/en/blog/auto...
#cybersecurity
"Automation isn’t the end of the road, it’s the beginning of a new way to defend ourselves."
telefonicatech.com/en/blog/auto...
#cybersecurity
Automation in Cyber Security: are we ready?
We explore the evolution and challenges of automation in Security Operations Centers (SOC), highlighting how new technologies enable faster, more accurate incident detection and response through autom...
telefonicatech.com
November 11, 2025 at 3:11 PM
Our @cyberalliance.bsky.social member @telefonica-en.bsky.social discusses Automation in Cyber Security: are we ready?
"Automation isn’t the end of the road, it’s the beginning of a new way to defend ourselves."
telefonicatech.com/en/blog/auto...
#cybersecurity
"Automation isn’t the end of the road, it’s the beginning of a new way to defend ourselves."
telefonicatech.com/en/blog/auto...
#cybersecurity
Recordings Available!
CyberNextDC 2025 brought together top minds from govt & industry to tackle emerging risks, boost supply chain resilience & shape cybersecurity’s future. We spotlighted bold strategies for a stronger digital world
#CyberNextDC #Cybersecurity #Cyberpolicy
tinyurl.com/mtuw4uj5
CyberNextDC 2025 brought together top minds from govt & industry to tackle emerging risks, boost supply chain resilience & shape cybersecurity’s future. We spotlighted bold strategies for a stronger digital world
#CyberNextDC #Cybersecurity #Cyberpolicy
tinyurl.com/mtuw4uj5
CyberNextDC 2025 - YouTube
As cyberattacks continue to hammer networks and critical infrastructure — threatening economic stability and global trust — it has never been more important ...
www.youtube.com
November 4, 2025 at 9:08 PM
Recordings Available!
CyberNextDC 2025 brought together top minds from govt & industry to tackle emerging risks, boost supply chain resilience & shape cybersecurity’s future. We spotlighted bold strategies for a stronger digital world
#CyberNextDC #Cybersecurity #Cyberpolicy
tinyurl.com/mtuw4uj5
CyberNextDC 2025 brought together top minds from govt & industry to tackle emerging risks, boost supply chain resilience & shape cybersecurity’s future. We spotlighted bold strategies for a stronger digital world
#CyberNextDC #Cybersecurity #Cyberpolicy
tinyurl.com/mtuw4uj5
Cyber Threat Alliance members get the edge!
www.cyberthreatalliance.org
#CTAearlyshares #ThreatIntelligence #EmpoweringCTA #ThreatResearch #Cybersecurity @cyberalliance.bsky.social
www.cyberthreatalliance.org
#CTAearlyshares #ThreatIntelligence #EmpoweringCTA #ThreatResearch #Cybersecurity @cyberalliance.bsky.social
November 4, 2025 at 4:55 PM
Cyber Threat Alliance members get the edge!
www.cyberthreatalliance.org
#CTAearlyshares #ThreatIntelligence #EmpoweringCTA #ThreatResearch #Cybersecurity @cyberalliance.bsky.social
www.cyberthreatalliance.org
#CTAearlyshares #ThreatIntelligence #EmpoweringCTA #ThreatResearch #Cybersecurity @cyberalliance.bsky.social
Want to stay ahead of cyber threats? @cyberalliance.bsky.social members get exclusive early access to #cyberthreat blogs, research, and reports - often 24–72 hours before the public. You can anticipate, prepare, and protect before others even know what’s coming.
Join us!
www.cyberthreatalliance.org
Join us!
www.cyberthreatalliance.org
Home - Cyber Threat Alliance
CTA works to improve the cybersecurity of our global digital ecosystem by sharing real-time, high-quality cyber threat information.
www.cyberthreatalliance.org
October 30, 2025 at 4:46 PM
Want to stay ahead of cyber threats? @cyberalliance.bsky.social members get exclusive early access to #cyberthreat blogs, research, and reports - often 24–72 hours before the public. You can anticipate, prepare, and protect before others even know what’s coming.
Join us!
www.cyberthreatalliance.org
Join us!
www.cyberthreatalliance.org
Verification works best when it’s low-burden, hard to fake, and built to serve everyone over time.
www.csoonline.com/article/4078...
#cybersecurity #datasovereignty #cyberpolicy
@cyallianceprez.bsky.social
www.csoonline.com/article/4078...
#cybersecurity #datasovereignty #cyberpolicy
@cyallianceprez.bsky.social
Data sovereignty proof: How to verify controls like ‘Project Texas’
Go beyond data sovereignty promises to proof with five CSO controls: zero-trust, local keys, logs, validation and third-party attestation.
www.csoonline.com
October 28, 2025 at 11:59 AM
Verification works best when it’s low-burden, hard to fake, and built to serve everyone over time.
www.csoonline.com/article/4078...
#cybersecurity #datasovereignty #cyberpolicy
@cyallianceprez.bsky.social
www.csoonline.com/article/4078...
#cybersecurity #datasovereignty #cyberpolicy
@cyallianceprez.bsky.social
Join us in congratulating @cyallianceprez.bsky.social for being honored with the Cyber Future Foundation Cyber Futurist Award. Congratulations, Michael. Well deserved!
#cybersecurity #cyberpolicy #leadership
#cybersecurity #cyberpolicy #leadership
October 27, 2025 at 9:55 PM
Join us in congratulating @cyallianceprez.bsky.social for being honored with the Cyber Future Foundation Cyber Futurist Award. Congratulations, Michael. Well deserved!
#cybersecurity #cyberpolicy #leadership
#cybersecurity #cyberpolicy #leadership
CTA's @cyallianceprez.bsky.social said "the downsizing runs the risk of leaving CISA blind to certain threats and trends and will also limit CISA’s ability to influence the private sector and communicate its priorities.”
tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
CISA’s international, industry and academic partnerships slashed
The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.
tinyurl.com
October 23, 2025 at 4:20 AM
CTA's @cyallianceprez.bsky.social said "the downsizing runs the risk of leaving CISA blind to certain threats and trends and will also limit CISA’s ability to influence the private sector and communicate its priorities.”
tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
Don't miss the NGO-ISAC Annual Conference – December 4 in Washington, DC
This important event focuses on tackling the critical security challenges facing civil society organizations
Registration is complimentary for all attendees
www.ngoisac.org/2025-confere...
#cybersecurity #criticalinfrastructure
This important event focuses on tackling the critical security challenges facing civil society organizations
Registration is complimentary for all attendees
www.ngoisac.org/2025-confere...
#cybersecurity #criticalinfrastructure
2025 NGO-ISAC Conference | NGO-ISAC
www.ngoisac.org
October 17, 2025 at 6:18 PM
Don't miss the NGO-ISAC Annual Conference – December 4 in Washington, DC
This important event focuses on tackling the critical security challenges facing civil society organizations
Registration is complimentary for all attendees
www.ngoisac.org/2025-confere...
#cybersecurity #criticalinfrastructure
This important event focuses on tackling the critical security challenges facing civil society organizations
Registration is complimentary for all attendees
www.ngoisac.org/2025-confere...
#cybersecurity #criticalinfrastructure
The @cyberalliance.bsky.social four founding CEO's - normally fierce competitors - sat down together to talk about why they chose to share intelligence. Their goal? To better protect the digital world we rely on. This conversation reveals why we are #strongertogether
www.youtube.com/watch?v=i50f...
www.youtube.com/watch?v=i50f...
CTA Founding CEO's Panel
YouTube video by Cyber Threat Alliance
www.youtube.com
October 17, 2025 at 3:14 PM
The @cyberalliance.bsky.social four founding CEO's - normally fierce competitors - sat down together to talk about why they chose to share intelligence. Their goal? To better protect the digital world we rely on. This conversation reveals why we are #strongertogether
www.youtube.com/watch?v=i50f...
www.youtube.com/watch?v=i50f...
CTA member @rapid7.com dives into the F5 Breach...
Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.
www.rapid7.com/blog/post/ve...
#cybersecurity #breach
Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.
www.rapid7.com/blog/post/ve...
#cybersecurity #breach
Inside the F5 Breach: What We Know and Recommended Actions
Rapid7 Labs reports & advises on a breach that F5 Networks recently disclosed – attributed to a sophisticated nation-state actor.
www.rapid7.com
October 17, 2025 at 2:38 PM
CTA member @rapid7.com dives into the F5 Breach...
Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.
www.rapid7.com/blog/post/ve...
#cybersecurity #breach
Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.
www.rapid7.com/blog/post/ve...
#cybersecurity #breach
“Diplomatically, we need to have the international community come together and start putting pressure on those countries that are harbouring cyber criminals and saying, 'you are acting outside the interests of the common good'. More diplomatic pressure – More economic pressure
tinyurl.com/yc8fy8ex
tinyurl.com/yc8fy8ex
'We're continuously under attack': Experts warn of AI and quantum-powered cyber threat | The National
Online security in focus at World Economic Forum event in Dubai
www.thenationalnews.com
October 14, 2025 at 5:01 PM
“Diplomatically, we need to have the international community come together and start putting pressure on those countries that are harbouring cyber criminals and saying, 'you are acting outside the interests of the common good'. More diplomatic pressure – More economic pressure
tinyurl.com/yc8fy8ex
tinyurl.com/yc8fy8ex
CTA @cyallianceprez.bsky.social said the agency might not currently have the staff to respond to a major #cybersecurity incident. “You’re talking about an agency that’s really sort of operating at a bare bones kind of level, these are threats that don’t tend to take a break”
tinyurl.com/mtr35zf7
tinyurl.com/mtr35zf7
Lawmakers sound alarm over lapsed cybersecurity law - Roll Call
The lapse of two key federal programs could discourage information sharing between companies and the government, leaving an opening for a cyberattack.
rollcall.com
October 13, 2025 at 5:38 PM
CTA @cyallianceprez.bsky.social said the agency might not currently have the staff to respond to a major #cybersecurity incident. “You’re talking about an agency that’s really sort of operating at a bare bones kind of level, these are threats that don’t tend to take a break”
tinyurl.com/mtr35zf7
tinyurl.com/mtr35zf7
"These changes increase the likelihood that a problem will be missed or overlooked, and they will make marshaling the capability to respond to significant incidents harder," @cyallianceprez.bsky.social
www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
CISA in Disarray Amid Shutdown and Growing Political Threats
Facing major turnover, partisan upheaval and a government shutdown, the U.S. cyber defense agency is now operating at a fraction of its strength, leaving states and
www.govinfosecurity.com
October 13, 2025 at 5:30 PM
"These changes increase the likelihood that a problem will be missed or overlooked, and they will make marshaling the capability to respond to significant incidents harder," @cyallianceprez.bsky.social
www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
Our @cyberalliance.bsky.social member @reversinglabs.com article on vibe coding
www.linkedin.com/pulse/vibe-c...
#cybersecurity #supplychain #vibecoding
www.linkedin.com/pulse/vibe-c...
#cybersecurity #supplychain #vibecoding
Vibe coding is the new OSS — in the worst way possible
Welcome to this week’s edition of Chainmail: Software Supply Chain Security News, which brings you the latest software security headlines, curated by the team at ReversingLabs (RL). This week: Vibe co...
www.linkedin.com
October 10, 2025 at 2:47 PM
Our @cyberalliance.bsky.social member @reversinglabs.com article on vibe coding
www.linkedin.com/pulse/vibe-c...
#cybersecurity #supplychain #vibecoding
www.linkedin.com/pulse/vibe-c...
#cybersecurity #supplychain #vibecoding
Next-gen computing isn’t just faster, it’s fundamentally different. Quantum, neuromorphic, biological, orbital. It’s expanding cyberspace, but also attack surface. Security must be embedded from day one, or we risk building brilliance on a brittle foundation. #QuantumComputing
tinyurl.com/bddjtkps
tinyurl.com/bddjtkps
Securing next-generation computing capabilities for all
Cybersecurity should be built into next-generation computing engineering and deployment processes, but it doesn’t have to mean compromising capability.
www.weforum.org
October 10, 2025 at 1:50 PM
Next-gen computing isn’t just faster, it’s fundamentally different. Quantum, neuromorphic, biological, orbital. It’s expanding cyberspace, but also attack surface. Security must be embedded from day one, or we risk building brilliance on a brittle foundation. #QuantumComputing
tinyurl.com/bddjtkps
tinyurl.com/bddjtkps
Now on stage at @CyberNextDC: Safeguarding the Backbone: Cybersecurity for Essential Services
Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
October 8, 2025 at 7:04 PM
Now on stage at @CyberNextDC: Safeguarding the Backbone: Cybersecurity for Essential Services
Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
Now on stage at #CyberNextDC Cyber Force Commission Update panel
www.youtube.com/live/VxtE68R...
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
#cybersecurity #cyberpolicy
www.youtube.com/live/VxtE68R...
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
#cybersecurity #cyberpolicy
October 8, 2025 at 6:38 PM
Now on stage at #CyberNextDC Cyber Force Commission Update panel
www.youtube.com/live/VxtE68R...
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
#cybersecurity #cyberpolicy
www.youtube.com/live/VxtE68R...
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
#cybersecurity #cyberpolicy
The Next Disruption: Agentic AI and the Business of Cybersecurity now speaking at #CyberNextDC
AI can help with vetting if someone is a 'real' person when recuriting and hiring. Ensure you have processes and audits in place.
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
AI can help with vetting if someone is a 'real' person when recuriting and hiring. Ensure you have processes and audits in place.
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
October 8, 2025 at 5:29 PM
The Next Disruption: Agentic AI and the Business of Cybersecurity now speaking at #CyberNextDC
AI can help with vetting if someone is a 'real' person when recuriting and hiring. Ensure you have processes and audits in place.
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
AI can help with vetting if someone is a 'real' person when recuriting and hiring. Ensure you have processes and audits in place.
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
Steve Vintz Co-Chief Executive Officer, Tenable speaking at #CyberNextDC
"21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
"21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
October 8, 2025 at 5:17 PM
Steve Vintz Co-Chief Executive Officer, Tenable speaking at #CyberNextDC
"21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
"21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
Now at #CyberNextDC: Vulnerable: Weakness in the Nation's Vulnerability Management System
CVE helps us all know we are talking about the same thing. It is critical not just in US but govts & industry worldwide!
Recognize this is an international effort & impact. It can't be single source of funding
CVE helps us all know we are talking about the same thing. It is critical not just in US but govts & industry worldwide!
Recognize this is an international effort & impact. It can't be single source of funding
October 8, 2025 at 3:43 PM
Now at #CyberNextDC: Vulnerable: Weakness in the Nation's Vulnerability Management System
CVE helps us all know we are talking about the same thing. It is critical not just in US but govts & industry worldwide!
Recognize this is an international effort & impact. It can't be single source of funding
CVE helps us all know we are talking about the same thing. It is critical not just in US but govts & industry worldwide!
Recognize this is an international effort & impact. It can't be single source of funding
Reposted by Cyber Threat Alliance
Starting now at #CyberNextDC a panel on "Vulnerable: Weaknesses in the Nation's Vulnerability Management System."
Watch here: www.youtube.com/live/VxtE68R...
Watch here: www.youtube.com/live/VxtE68R...
October 8, 2025 at 3:22 PM
Starting now at #CyberNextDC a panel on "Vulnerable: Weaknesses in the Nation's Vulnerability Management System."
Watch here: www.youtube.com/live/VxtE68R...
Watch here: www.youtube.com/live/VxtE68R...
Reposted by Cyber Threat Alliance
@cybercoalition.bsky.social executive director Ari Schwartz talks about the continued need for information sharing as he kicks off #CyberNextDC and asks Congress to asks Congress to reauthorize the Cybersecurity Information Sharing Act. Watch here: www.youtube.com/live/VxtE68R...
October 8, 2025 at 1:45 PM
@cybercoalition.bsky.social executive director Ari Schwartz talks about the continued need for information sharing as he kicks off #CyberNextDC and asks Congress to asks Congress to reauthorize the Cybersecurity Information Sharing Act. Watch here: www.youtube.com/live/VxtE68R...
Now speaking at #CyberNextDC, the Cyber Luminaries Panel.
Paraphrasing: Many attacks are from teenagers - if we can't stop teenagers, we can't stop nation states. The advantage is to the attackers, not the defenders. Better to prioritize addressing the consequences of attacks.
#cyberpolicy
Paraphrasing: Many attacks are from teenagers - if we can't stop teenagers, we can't stop nation states. The advantage is to the attackers, not the defenders. Better to prioritize addressing the consequences of attacks.
#cyberpolicy
October 8, 2025 at 2:42 PM
Now speaking at #CyberNextDC, the Cyber Luminaries Panel.
Paraphrasing: Many attacks are from teenagers - if we can't stop teenagers, we can't stop nation states. The advantage is to the attackers, not the defenders. Better to prioritize addressing the consequences of attacks.
#cyberpolicy
Paraphrasing: Many attacks are from teenagers - if we can't stop teenagers, we can't stop nation states. The advantage is to the attackers, not the defenders. Better to prioritize addressing the consequences of attacks.
#cyberpolicy
Now speaking at #CyberNextDC @megans.bsky.social on What Cyber Policy Needs Next: Through the Looking Glass of the Ransomware Task Force
"We are too dependable on undependable things'
#cyberpolicy #cybersecurity #ransomware
@cyberalliance.bsky.social @cyberseccenter.bsky.social
"We are too dependable on undependable things'
#cyberpolicy #cybersecurity #ransomware
@cyberalliance.bsky.social @cyberseccenter.bsky.social
October 8, 2025 at 2:03 PM
Now speaking at #CyberNextDC @megans.bsky.social on What Cyber Policy Needs Next: Through the Looking Glass of the Ransomware Task Force
"We are too dependable on undependable things'
#cyberpolicy #cybersecurity #ransomware
@cyberalliance.bsky.social @cyberseccenter.bsky.social
"We are too dependable on undependable things'
#cyberpolicy #cybersecurity #ransomware
@cyberalliance.bsky.social @cyberseccenter.bsky.social