sb-nz logo
Story image

Fortinet formalises threat information sharing agreement with INTERPOL

18 Jun 2018

Cybersecurity solutions provider Fortinet today announced that it has formalised its threat sharing with INTERPOL. 

The goal of the agreement is to proactively combat cybercrime and threats to privacy globally through the sharing of threat information generated by its global threat research team.

Fortinet will be involved in operational briefings at INTERPOL and vice versa.

A threat intelligence expert from Fortinet will be assigned to collaborate with experts at the INTERPOL Global Complex for Innovation (IGCI), helping provide a clearer understanding of the current threat landscape, which in turn will help the INTERPOL team and law enforcement use the information to prevent risks to security and privacy.

While the agreement formalises the cooperation between Fortinet and INTERPOL, both organisations have been operationally collaborating for over two years. INTERPOL Global Complex for Innovation acting executive director Silvino Schlickmann Jr. says, “Tackling cybercrime cannot be resolved unilaterally by law enforcement alone, but is a joint responsibility which requires trusted relationships with the private sector.

Cooperation between Fortinet and INTERPOL

Fortinet has been an active member of an expert working group within INTERPOL for more than two years, providing cyber threat intelligence which has helped discover and identify multiple cybercrime operations.

Last year, Fortinet was one of several private sector companies that provided support to an INTERPOL-led operation targeting cybercrime across the ASEAN region, resulting in the identification of nearly 9,000 command-and-control (C2) servers as well as hundreds of compromised websites, including government portals.

Previously, Fortinet also helped uncover through close threat information cooperation between INTERPOL, Fortinet, and other private sector partners, a group of online fraudsters behind thousands of online scams totalling more than $60 million and involving hundreds of victims worldwide.

Fortinet global security strategist Derek Manky says, “Organisations continue to struggle against evolving threats, an expanding attack surface, and a growing security skills shortage.

“Law enforcement, in particular, can also be hampered by the fact that cybercrime often crosses political and jurisdictional boundaries.

“Actionable threat intelligence with global visibility is the best way to move from being reactive to proactive in a world where cybercrime has no borders,” says Manky.

“No single organisation has a complete view into the security landscape, which is why threat information sharing and collaboration between public and private organisations is critical.”

Story image
COVID-19 crushes fingerprint reader market
However, the biometrics market is expected to regain momentum with alternatives already beginning to find their feet.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Link image
The importance of data resilience in the current cybersecurity climate
Protecting an organisation's data is one of the most crucial functions of any CISO. Strategies should be in place where data is stored securely and cost-effectively.More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More