Third-Party
Industry Collaboration & StandardsWhalebone’s “Network Security Threat Landscape Report 2024”
Whalebone shares its most recent threat intel findings observed across all malicious traffic analyzed DNS resolvers (Published January 2025). View the report
CTA’s “Cybersecurity in the Age of Gen AI Part 2”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part 2 – Navigating Cyber threats to Gen AI systems (Published January 2025). View the report
CTA’s “Cybersecurity in the Age of Gen AI Part 1”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part I – Combating GenAI Assisted Cyber Threats (Published January 2025). View the report
CTA’s ‘Threat Intelligence Practitioner’s Summit’ (TIPS 2025)
CTA’s ‘Threat Intelligence Practitioner’s Summit’ (TIPS 2025) (Arlington, VA May 14th-15th 2025). View the event home page
The Cybercrime Atlas Impact Report 2024
A first report from the WEF-backed Cybercrime Atlas on how companies in the financial and broader digital ecosystem are using open source threat intel to identify chokepoints in the cybercriminal ecosystem to conduct coordinated disruption campaigns (published October 2024). View the report
V2.0 of GSMA’s “Post Quantum Guidelines for Telecom Use Cases”
V2.0 of ‘Post Quantum Guidelines for Telecom Use Cases’ supports a detailed migration planning exercise for operators and technology vendors, including an analysis of standards, functional architecture and performance for each use case (published October 2024).
View the Report
The Communications Sector Coordination Council Annual Report 2024
The annual report highlighting the work of the CSCC and its inputs into the other private and public sector bodies charged with defending America’s critical infrastructure against cyber and other threats (published 2024). View the Document
The ITU’s Global Cybersecurity Index 2024
The 5th edition of the ITU’s Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity across the five pillars of Legal, Technical, Organizational, Capacity Development, and Cooperation (Published September 2024). View the Document
GSMA Key Management Version 7.0
This document outlines procedures for GSMA members and eligible non-members to exchange certificates and key material to facilitate use cases that rely on public key cryptographic algorithms. (published September2024). View the Document
SSSCIP of Ukraine: “Russian Cyber Operations: APT Activity Report 1H 2024”
Ukraine’s cyber defenders somehow managed to reduce the volume of critical & high severity incidents by 85% over the latest six month period – down from 187 critical and high severity incidents in 2H 2023 to just 28 in 1H 2024 (published September 2024). View the Report
The GSMA’s ‘IoT Security Guidelines – April 2024’
The GSMA’s ‘IoT Security Guidellines’ promote best practice for the secure design, development and deployment of hashtag#IoT services, and provide a mechanism to evaluate security measures (April 2024). View the Guidelines
CTA’s ‘2024 Summer Olympics Threat Assessment’
While the Tokyo Olympics faced serious cyber threats, the Paris 2024 Games are expected to face even greater challenges. Read the Cyber Threat Alliance ‘s assessment of what those threats look like (Published July 2024). View the Report