IBM Rallies Cybercrime Tooling Taskforce

IBM says we need more threat intelligence tooling.

The firm has announced plans to bring together more than 1,000 organisations across 16 industries to participate in its X-Force Exchange threat intelligence network.

Recently launched, the initiative aims to provide open access to historical and real-time data feeds of threat intelligence, including reports of live attacks from IBM’s global threat monitoring network, enabling enterprises to defend against cybercrime.

This new cloud-based cyberthreat network, powered by IBM Cloud, is designed to foster broader industry collaboration by sharing actionable data to defend against these very real threats to businesses and governments.

 The company provided free access last month, via the X-Force Exchange, to its 700 terabyte threat database – a volume equivalent to all data that flows across the internet in two days. This includes two decades of malicious Cyberattacks data from IBM, as well as anonymous threat data from the thousands of organizations for which IBM manages security operations. Participants have created more than 300 new collections of threat data in the last month alone.

“Cybercrime has become the equivalent of a pandemic — no company or country can battle it alone,” said Brendan Hannigan, General Manager, IBM Security. ““We have to take a collective and collaborative approach across the public and private sectors to defend against cybercrime. Sharing and innovating around threat data is central to battling highly organized cybercriminals; the industry can no longer afford to keep this critical resource locked up in proprietary databases. With X-Force Exchange, IBM has opened access to our extensive threat data to advance collaboration and help public and private enterprises safeguard themselves.”

In the past month since the launch of IBM’s threat intelligence network, there have been more than 1,000 data queries per day from organizations around the world. 

These organizations include six of the world’s top 10 retailers and five of the top 10 banks, as well as the top 10 companies across the automotive, education and high-tech industries. By freely consuming, sharing and acting on real-time threat intelligence from their networks and IBM’s own repository of threat intelligence, users can identify and help stop threats.

 

About Adrian Bridgwater

Adrian Bridgwater is a freelance journalist specialising in cross platform software application development and data analytics as well as all related aspects of software engineering and project management.   Adrian is a regular writer and blogger with Computer Weekly, Forbes, The Register and others. His journalistic creed is to bring forward-thinking, impartial, technology editorial to a professional (and hobbyist) technology audience around the world. His mission is to objectively inform, educate and challenge.
This entry was posted in Vendor News. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *