<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>CTA: Revolutionizing Global Cybersecurity Through Unparalleled Collaboration - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="qgsYmSH48t"&gt;&lt;a href="https://www.cyberthreatalliance.org/cyber-threat-alliance-revolutionizing-global-cybersecurity-through-unparalleled-collaboration/"&gt;CTA: Revolutionizing Global Cybersecurity Through Unparalleled Collaboration&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/cyber-threat-alliance-revolutionizing-global-cybersecurity-through-unparalleled-collaboration/embed/#?secret=qgsYmSH48t" width="600" height="338" title="&#x201C;CTA: Revolutionizing Global Cybersecurity Through Unparalleled Collaboration&#x201D; &#x2014; Cyber Threat Alliance" data-secret="qgsYmSH48t" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2023/06/CTA_Scitum-Guest-Blog-01-01.png</thumbnail_url><thumbnail_width>2888</thumbnail_width><thumbnail_height>2198</thumbnail_height><description>By SCILabs, Scitum-Telmex In the increasingly interconnected digital landscape, sharing threat intelligence among organizations has become vital for maintaining robust cybersecurity strategies. Despite its importance, the process grapples with numerous challenges. These include establishing trust and confidentiality, ensuring data standardization, maintaining the quality and relevance of information, managing the high volume of data or almost &hellip; Continued</description></oembed>
