<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>Reinventing Cybersecurity in the Age of AI: Collaboration is No Longer Optional - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="h0KttbnQZp"&gt;&lt;a href="https://www.cyberthreatalliance.org/reinventing-cybersecurity-in-the-age-of-ai-collaboration-is-no-longer-optional/"&gt;Reinventing Cybersecurity in the Age of AI: Collaboration is No Longer Optional&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/reinventing-cybersecurity-in-the-age-of-ai-collaboration-is-no-longer-optional/embed/#?secret=h0KttbnQZp" width="600" height="338" title="&#x201C;Reinventing Cybersecurity in the Age of AI: Collaboration is No Longer Optional&#x201D; &#x2014; Cyber Threat Alliance" data-secret="h0KttbnQZp" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2025/08/Dorit-Dor_Guest-Blog_20250819-05-scaled.png</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1740</thumbnail_height><description>By Dr. Dorit Dor, Co-founder of&#xA0;Qbeat&#xA0;Ventures&#xA0;&amp; Check Point Fellow I am proud to have served on the board of the Cyber Threat Alliance (CTA) for nearly four years. The level of collaboration achieved among industry leaders through the CTA is both inspiring and essential. It&#x2019;s a call to action for those who haven&#x2019;t yet joined,&#xA0;to &hellip; Continued</description></oembed>
