Story image

Fortinet formalises threat information sharing agreement with INTERPOL

18 Jun 18

Cybersecurity solutions provider Fortinet today announced that it has formalised its threat sharing with INTERPOL. 

The goal of the agreement is to proactively combat cybercrime and threats to privacy globally through the sharing of threat information generated by its global threat research team.

Fortinet will be involved in operational briefings at INTERPOL and vice versa.

A threat intelligence expert from Fortinet will be assigned to collaborate with experts at the INTERPOL Global Complex for Innovation (IGCI), helping provide a clearer understanding of the current threat landscape, which in turn will help the INTERPOL team and law enforcement use the information to prevent risks to security and privacy.

While the agreement formalises the cooperation between Fortinet and INTERPOL, both organisations have been operationally collaborating for over two years.

INTERPOL Global Complex for Innovation acting executive director Silvino Schlickmann Jr. says, “Tackling cybercrime cannot be resolved unilaterally by law enforcement alone, but is a joint responsibility which requires trusted relationships with the private sector.

Cooperation between Fortinet and INTERPOL

Fortinet has been an active member of an expert working group within INTERPOL for more than two years, providing cyber threat intelligence which has helped discover and identify multiple cybercrime operations.

Last year, Fortinet was one of several private sector companies that provided support to an INTERPOL-led operation targeting cybercrime across the ASEAN region, resulting in the identification of nearly 9,000 command-and-control (C2) servers as well as hundreds of compromised websites, including government portals.

Previously, Fortinet also helped uncover through close threat information cooperation between INTERPOL, Fortinet, and other private sector partners, a group of online fraudsters behind thousands of online scams totalling more than $60 million and involving hundreds of victims worldwide.

Fortinet global security strategist Derek Manky says, “Organisations continue to struggle against evolving threats, an expanding attack surface, and a growing security skills shortage.

“Law enforcement, in particular, can also be hampered by the fact that cybercrime often crosses political and jurisdictional boundaries.

“Actionable threat intelligence with global visibility is the best way to move from being reactive to proactive in a world where cybercrime has no borders,” says Manky.

“No single organisation has a complete view into the security landscape, which is why threat information sharing and collaboration between public and private organisations is critical.”

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.