How Open Security Outpaces Cybercrime
Cybercrime Pays, Which is Why it’s Becoming Organized
Cybercrime has rapidly moved from the world of small-stakes theft to become one of the most profitable types of crime in the world.Seeing the enormous opportunity in everything from identity theft to large-scale corporate incursions, hackers are banding together to run much larger attacks, similar to traditional crime rings.
80% of cyber-attacks are driven by criminal organizations, in which data, tools and expertise are widely shared.
Moats are Not Keeping the Intruders Out
Years ago, in the world of local networks, enterprises were able to focus attention and resources on protecting their own security “endpoints.” If threats couldn’t pierce the perimeter, critical data would remain safe. Now, enabled by a combination of ubiquitous connectivity, data availability, open networks and the growing Internet of Things, hackers are storming the castles in waves. In fact, they’re already inside—the average security breach isn’t discovered for months. What’s needed is not a moat, but an intelligent immune system that detects anomalies and marshals rapid response. And most in-house cybersecurity teams are stuck piecing together multiple sources of intelligence to try to keep up.Organized Threats Require a Coordinated Response
Recognizing the increasing dangers posed by hackers—both freelance and organized—we opened up our own global network of cyberthreat research and invited the industry to share intelligence—creating an entirely new approach to fight the threat.In April 2015 we opened the IBM X-Force Exchange, a 700-terabyte threat database that includes two decades of malicious cyber-attack data from IBM, as well as anonymous threat data from the thousands of organizations for which IBM manages security operations. Already, more than 2,000 organizations across 16 global industries are active on the platform, including:
- 5 of the 10 largest banks in the world
- 6 of the top 10 retailers
- 6 of the top 10 automakers
- 3 of the top 10 healthcare providers
Expanding on our open approach to security, we also launched the IBM Security App Exchange, allowing partners, vendors and customers to share and build applications, security app extensions and enhancements to IBM Security products.
**** Ever wonder how cyberattacks and malware are created, and how they get into your system to steal your data? See the life of a cyberthreat first hand, from the moment of its inception within the Dark Web of hackers, to when it is sent around the world to infect as many systems as possible. With collaboration across the networks of “the good guys,” we can help stop these exploits from being shared and spread. Similar to how vaccinations and health warnings can help to stop a disease pandemic, having the right protocols in place can help send malware back to the Dark Web for good.
Join the fight against hackers at http://bit.ly/1IrvwLu