Story image

Collaboration key component of threat prevention

14 Oct 15

A crucial part of threat prevention is collaboration between businesses, and now more than ever it's necessary to build a cyber security ecosystem, according to Palo Alto Networks.

Sean Duca, Palo Alto Networks vice president and regional chief security officer for Asia Pacific, says, “The next step in the cyber security evolution will be to bring the business community together to identify cyber criminals and threats.

“By establishing a so-called cyber security ecosystem, businesses can create a type of ‘herd immunity’.

“If one business is attacked, the rest of the business community can be made aware of how the threat behaves and how to prevent it.”

According to Palo Alto Networks, there are three key ingredients to creating a cyber security ecosystem:

1. Leveraging threat prevention communities

As a first step, members of commercial industries should join threat information sharing and analysis organisations that are linking trusted threat prevention communities together, the company says.

Sharing cyber threat information in real time using standardised methods strengthens the ability of everyone to detect and prevent cyberattacks and is the foundation for a cyber security ecosystem.

“Companies not in the security space, like Nike for example, are working together in groups like the Retail Cyber Intelligence Sharing Center. Every organisation’s security experiences strengthen the entire ecosystem,” says Duca.

2. Trusting each other

Developing best practices for sharing information and risk mitigation strategies requires long-term cultural change, Palo Alto Networks says.

“Trusting your security information in the hands of other businesses can be hard to do.

“However, collaborating and investing in the best technology available can accelerate the ability of the cyber ecosystem to learn, resulting in stronger protection for everyone,” Duca says.

3. Machine-to-machine threat information sharing

Automated threat detection and information sharing lets businesses prevent threats that have targeted other organisations, the company says.

“Integrated systems that were built to work together can also be linked to information sharing repositories in the cloud.

“Automated systems can learn to take actions by observing how the threats behaved and were prevented,” says Duca.

NZ Internet Task Force joins iSANZ Hall of Fame
NZITF chair Barry Brailey and former chairs Mike Seddon and Paul McKitrick received the award in Auckland last week.
Quantum computing: The double-edged sword for cybersecurity
Quantum computing is quickly moving from science fiction to reality.
Three ways to achieve data security whilst enabling BYOD
"A mobility strategy is now more important than ever before, that said, selecting the right one is often no small task."
How IoT and hybrid cloud will change in 2019
"Traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud."
WatchGuard’s eight (terrifying) 2019 security predictions
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
GCSB's CORTEX project scoops iSANZ Award
“I believe this award is particularly significant as it is acknowledgement from our peers in the information security industry and from across the private sector."
NZ firms lack cybersecurity confidence, HP survey says
Out of 434 of New Zealand’s small and large businesses, only half (50%) feel confident that they would be able to cope if they experienced a significant cybersecurity breach.
SonicWall secures hybrid clouds by simplifying firewall deployment
Once new products are brought online in remote locations, administrators can manage local and distributed networks.