Tag: cyber threat alliance

  • VB2020 TIPS presentation: Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration

    As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. Business Email Compromise (BEC) is now the most…

  • VB2020 TIPS presentation: Collaborating with Competitors: A Better Strategy to Beat Adversaries

    As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. Threat intelligence sharing has steadily been improving over…

  • VB2020 TIPS presentations: cybercrime in the DACH region and ransomware in LATAM

    As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. Despite the fact that globalisation continues apace, the…

  • VB2020 TIPS presentation: Intelligence Sharing for Supply Chain Security

    As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. As globalisation continues apace, supply chains have become…

  • First 11 partners of VB2019 announced

    The Virus Bulletin Conference is all about bringing the security community together to share intelligence and move the industry forward, but we wouldn’t be able to do any of this without the support of our partners. Today, we are pleased to announce the first 11 partners of VB2019. Partnering the conference at Platinum level we…

  • First 11 partners of VB2019 announced

    The Virus Bulletin Conference is all about bringing the security community together to share intelligence and move the industry forward, but we wouldn’t be able to do any of this without the support of our partners. Today, we are pleased to announce the first 11 partners of VB2019. Partnering the conference at Platinum level we…

  • VB2018 presentation: Levelling up: why sharing threat intelligence makes you more competitive

    Here at VB we often talk about the importance of sharing intelligence, and many of us coming into the industry for the first time have been genuinely surprised by the willingness to share information among competitors. Yet even within this relatively open industry, there are still barriers to sharing threat intelligence data, be they technical,…

  • VB2018 presentation: Levelling up: why sharing threat intelligence makes you more competitive

    Here at VB we often talk about the importance of sharing intelligence, and many of us coming into the industry for the first time have been genuinely surprised by the willingness to share information among competitors. Yet even within this relatively open industry, there are still barriers to sharing threat intelligence data, be they technical,…

  • VB2018 preview: Cyber Threat Alliance

    Last week, the Cyber Threat Alliance (CTA) published a report on the illicit mining of cryptocurrencies. The report is notable for two reasons: first because it is exceptionally good in its analysis of the problem, and secondly (and perhaps not unrelated) because researchers from no fewer than eight security companies contributed to the report. Though the…

  • VB2018 preview: Cyber Threat Alliance

    Last week, the Cyber Threat Alliance (CTA) published a report on the illicit mining of cryptocurrencies. The report is notable for two reasons: first because it is exceptionally good in its analysis of the problem, and secondly (and perhaps not unrelated) because researchers from no fewer than eight security companies contributed to the report. Though the…