Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Cyber-Threat Data Sharing Off to Slow Start Despite U.S. Legislation

    Written by

    Robert Lemos
    Published October 2, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Sharing information on cyber-threats has garnered a great deal of U.S. government support over the past 18 months.

      In February 2015, President Obama signed Executive Order 13691, encouraging collaboration between private companies and with the government through organizations known as information sharing and analysis organizations, or ISAOs.

      Nearly a year later, Congress passed a 2,009-page military spending bill that included among its provisions the Cybersecurity Act of 2015, a law that affords companies legal protections in exchange for sharing information with the government about cyber-attacks. This past summer, the Department of Homeland Security released guidelines for sharing details of attacks with the federal government.

      Despite the government action, companies have been reticent to begin sharing data on the attacks hitting their networks. One report found that while nearly 140 organizations were connected to DHS’s Automated Indicator Sharing system, only one company was sharing any significant amount of information.

      Nine months after the Cybersecurity Act became law, the complexity of information sharing and the natural human reluctance to reveal details about network and data breaches means that convincing organizations to share continues to be difficult, Chris Coleman, CEO of threat-intelligence firm LookingGlass, told eWEEK.

      “I always question whether it’s in human nature to share this type of information,” he said. “For companies, the legal issues of a material breach … mean that there is not a lot of established policy in regards to sharing. So [many say] why take the risk?”

      Yet defenders need to exchange information on cyber-threats. Such intelligence promises to aid companies in hardening their defenses against the most pervasive attacks and assigning staff and resources to the most pressing threats.

      Yet, very few companies have started sharing information. Large companies are studying the legal issues, concerned that talking about attacks will bring lawsuits and legal jeopardy. Smaller firms generally just do not know where to begin, Greg White, executive director of the ISAO Standards Organization and a professor of computer science at University of Texas at San Antonio, told eWEEK.

      “Mostly our problem at this point is getting the word out,” he said, adding that “if you are one of those entities that sign up for a feed and you are getting thousands of indicators, many don’t know what to do with that.”

      The Cybersecurity Act of 2015 should assuage fears of legal repercussions to limited sharing. The law, which had been discussed in Congress in various forms for nearly a decade, orders government agencies to share information about threats with companies and other groups, and mandates new processes and systems to disseminate information about threats from the private sector to government agencies.

      Before the law, companies would only rarely voluntarily share breach information.

      Cyber-Threat Data Sharing Off to Slow Start Despite U.S. Legislation

      Moving away from that entrenched mindset will take some time, LookingGlass’s Coleman said.

      “One of the biggest fears of collaboration with the government is that we had no legal protections,” he said. “When we ran those sharing information agreements by the lawyers, they would shiver.”

      Yet the formation of like-minded organizations to share best practices, information on ongoing attacks, and—for more advanced groups—indicators of compromise (IOCs) holds promise. Those groups—called information sharing and analysis organizations, or ISAOs—help mitigate fears that information may be leaked and collect professionals together who have the same potential issues, according to the ISAO SO’s White.

      “Everybody needs to be part of an ISAO,” he said. “That is our opinion.”

      The Department of Homeland Security selected the University of Texas at San Antonio to create standards for forming such information sharing groups. Many already exist. Businesses that are in industries deemed to be critical are likely a member of an information sharing and analysis center, or ISAC, which are now considered one type of ISAO.

      Smaller companies, however, often are not served by such organizations because they do not have the expertise to use the data. Yet ISAOs can share best practice information and help corporate networks collaborate with each other.

      “We are still trying to feel our way in what [is] the best type of information to share,” said Bill Wright, director of government affairs and cyber-security partnerships at security firm Symantec. “And while it is important, there is no silver bullet here. We still need good cyber-hygiene, we still need good technology and we still need good training for end users.”

      Yet challenges exist for such organizations. Many companies do not like participating in groups where only a few members share information and the vast majority consume the intelligence. These other organizations—often called “leeches”—just consume information. The Cyber Threat Alliance, of which Symantec is a member, requires that each member share 1,000 new attack samples every day in an attempt to resist this tendency.

      “The challenge in intelligence is that it is just information unless I can give you something that you care about that impacts your business,” said Coleman. “So we have to make sure that we are delivering something that is relevant to your business. Otherwise, you are giving the customer the top layer of information and forcing them to determine what they care about.”

      Yet while information sharing will not, in and of itself, make companies secure, it is an important step, said Symantec’s Wright.

      “Cyber-security has become a team sport, and we have to be sharing,” Wright said. “Government can’t go at it alone, and companies cannot go at it alone.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.