Story image

Palo Alto Networks & INTERPOL finalise major threat-sharing intelligence agreement

08 Aug 2017

Palo Alto Networks will soon be the first cybersecurity company in the world to sign a Data Exchange Agreement with the INTERPOL Global Complex for Innovation (IGCI), which the company says is a major step towards information sharing.

The agreement aims to share threat information about cyber threats, crime and criminal trends in cyberspace, generated by Palo Alto Networks and its threat intelligence arm, Unit 42.

Palo Alto Networks will also be involved in INTERPOL operational briefings and vice versa. The company states that a Unit 42 threat intelligence expert will work with IGCI to better understand the current threat landscape.

This can then provide law information officers with the information needed to prevent cyber attacks.

‘Tackling cybercrime is not something that law enforcement can do in isolation. Cooperation with the private sector is essential if we are to effectively combat this global phenomenon,” comments ICGI’s executive director, Noboru Nakatani.

“INTERPOL’s agreement with Palo Alto Networks is an important step in our ongoing efforts to ensure law enforcement worldwide has access to the information they need to combat cyber threats which are a significant issue for both the public and private sectors.”

Palo Alto Networks and INTERPOL have long collaborated on projects. Earlier this year Palo Alto Networks was one of seven security firms that helped identify 9000 command-and-control servers across the ASEAN region, as well as compromised websites that included government portals.

Palo Alto Networks vice president and regional chief security officer for Asia-Pacific, Sean Duca, says cybercrime comes with a significant amount of risk.

“This collaboration marks a mutual commitment to information sharing, which is necessary in preventing successful cyberattacks. Together with INTERPOL, we can continue to raise awareness and educate business leaders and reduce the collective cybersecurity risk over time,” he explains.

The company’s State of Cybersecurity in Asia Pacific found that 44% of 500 Asia Pacific firms surveyed are now sharing threat information in their respective industries. 46% said they did not share information, and 9% said they weren’t sure.

“Another way to prevent cyber threats is to share and escalate information. The survey shows that 83 percent of respondents believe it is important to share information with the authorities. At the moment, however, only 44 percent share information with their industry peers, with the healthcare industry leading the way,” the report says.

 Palo Alto says that the new agreement with INTERPOL takes that information sharing across industries, public and private organisations to protect everyone and our digital way of life.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.