NEC joins Cyber Threat Alliance

Categories Biometrics News  |  Trade Notes

NEC announced its membership in the Cyber Threat Alliance (CTA), a U.S.-based nonprofit that facilitates the sharing of cyber threat information among member companies to improve products and services and elevate security for customers.

The CTA was founded as a nonprofit organization in January 2017 by Check Point Software Technologies Ltd., Cisco, Fortinet, McAfee, Palo Alto Networks and Symantec with the aim of generating and sharing cross-industrial, exhaustive and valuable threat information. In February 2017 former White House Special Assistant to the President Michael Daniel was appointed as the first CEO and President of the CTA. The CTA currently has a membership of 20 companies.

According to the announcement, CTA member companies can receive approximately 65,000 Structured Threat Information eXpression (STIX) packages every day via the threat information-sharing platform operated by the CTA. STIX packages contain traces of threats and contextualized threat information. Members can use the information for their own analysis or to enhance their products and services.

In order for CTA member companies to receive threat information, they are required to provide their own threat information with a certain value based on algorithms specified by the CTA. Thus, they need to maintain the technologies to collect, analyze and evaluate their own threat information. With this approach, the CTA is enabling the sharing of cyber threat information that is mutually beneficial to member companies.

“Cybersecurity is a global issue. At NEC, our focus is on using information and communication technology to enrich people’s lives, and the CTA’s mission of securing the global digital ecosystem is inline with our vision of orchestrating a brighter world,” said Kazuhiro Sakai, Executive Vice President, CIO and CISO of NEC. “We look forward to elevating security throughout the world through our partnership with the CTA.”

Related Posts

Article Topics

 |   |   | 

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Research

Biometrics White Papers

Biometrics Events

Explaining Biometrics