Story image

Fortinet formalises threat information sharing agreement with INTERPOL

18 Jun 2018

Cybersecurity solutions provider Fortinet today announced that it has formalised its threat sharing with INTERPOL. 

The goal of the agreement is to proactively combat cybercrime and threats to privacy globally through the sharing of threat information generated by its global threat research team.

Fortinet will be involved in operational briefings at INTERPOL and vice versa.

A threat intelligence expert from Fortinet will be assigned to collaborate with experts at the INTERPOL Global Complex for Innovation (IGCI), helping provide a clearer understanding of the current threat landscape, which in turn will help the INTERPOL team and law enforcement use the information to prevent risks to security and privacy.

While the agreement formalises the cooperation between Fortinet and INTERPOL, both organisations have been operationally collaborating for over two years. INTERPOL Global Complex for Innovation acting executive director Silvino Schlickmann Jr. says, “Tackling cybercrime cannot be resolved unilaterally by law enforcement alone, but is a joint responsibility which requires trusted relationships with the private sector.

Cooperation between Fortinet and INTERPOL

Fortinet has been an active member of an expert working group within INTERPOL for more than two years, providing cyber threat intelligence which has helped discover and identify multiple cybercrime operations.

Last year, Fortinet was one of several private sector companies that provided support to an INTERPOL-led operation targeting cybercrime across the ASEAN region, resulting in the identification of nearly 9,000 command-and-control (C2) servers as well as hundreds of compromised websites, including government portals.

Previously, Fortinet also helped uncover through close threat information cooperation between INTERPOL, Fortinet, and other private sector partners, a group of online fraudsters behind thousands of online scams totalling more than $60 million and involving hundreds of victims worldwide.

Fortinet global security strategist Derek Manky says, “Organisations continue to struggle against evolving threats, an expanding attack surface, and a growing security skills shortage.

“Law enforcement, in particular, can also be hampered by the fact that cybercrime often crosses political and jurisdictional boundaries.

“Actionable threat intelligence with global visibility is the best way to move from being reactive to proactive in a world where cybercrime has no borders,” says Manky.

“No single organisation has a complete view into the security landscape, which is why threat information sharing and collaboration between public and private organisations is critical.”

Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.