Global Cyber Alliance: Difference between revisions
Appearance
Created page with "The '''Global Cyber Alliance''' (GCA) is an IGO initiative for building practical, measurable solutions for making the internet more trustworthy and accelerating the adoption..." |
|||
Line 1: | Line 1: | ||
The '''Global Cyber Alliance''' (GCA) is an IGO initiative for building practical, measurable solutions for making the internet more trustworthy and accelerating the adoption of them around the world. Its founding organizations include the Manhattan District Attorney’s Office, City of London Police, and The Center for Internet Security.<ref>[https://www.globalcyberalliance.org/ GCA Homepage]</ref> | The '''Global Cyber Alliance''' (GCA) is an IGO initiative for building practical, measurable solutions for making the internet more trustworthy and accelerating the adoption of them around the world. Its founding organizations include the Manhattan District Attorney’s Office, City of London Police, and The Center for Internet Security.<ref>[https://www.globalcyberalliance.org/ GCA Homepage]</ref> | ||
==Project== | ==Project Collaborations== | ||
===DMARC=== | |||
===AIDE=== | |||
===Quad9=== | |||
===GCA Cybersecurity Toolkits=== | |||
===Domain Trust=== | |||
* data sharing about and takedown of [[Malicious Domain]]s via an ongoing cycle of discovery, validation, and action<ref>[https://www.icann.org/en/system/files/files/presentation-day2dc-domaintrust-platform-daigle-26may21-en.pdf GCA Presentation, IDS 2021]</ref> | |||
==References== | ==References== |
Revision as of 15:54, 30 September 2021
The Global Cyber Alliance (GCA) is an IGO initiative for building practical, measurable solutions for making the internet more trustworthy and accelerating the adoption of them around the world. Its founding organizations include the Manhattan District Attorney’s Office, City of London Police, and The Center for Internet Security.[1]
Project Collaborations
DMARC
AIDE
Quad9
GCA Cybersecurity Toolkits
Domain Trust
- data sharing about and takedown of Malicious Domains via an ongoing cycle of discovery, validation, and action[2]