As the world of security grows more complex and interconnected, cooperation between individuals and organizations becomes more vital than ever. Not even the best organizations can be successful if they aren’t sharing threat intelligence with peers, law enforcement and even competitors. Cooperation is often the only way to make up for the holes every enterprise has in its detection capabilities, understanding and capacity to mitigate the rapidly evolving threats they face every day.

Threat Intelligence in Action

I work with the team at Akamai that detected and researched the malware that came to be known as WireX. Several vendors noticed this malware strain at the beginning of August, but there wasn’t enough data to take meaningful action against the botnet until researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle Dyn, RiskIQ, Team Cymru and other organizations began talking.

No single entity possessed the skill set required to research, track and deal with this botnet until they combined their efforts. While the collaboration was initiated at an organizational level, it was really the personal relationships that made the discovery possible. Several of the companies involved compete directly in their respective spaces, but each one allowed and even encouraged its employees to share threat intelligence for the greater good. The positive PR didn’t hurt, either.

The Power of Personal Relationships

Not every organization has researchers on its security team, but every company concerned with the security of its network and systems should be building relationships and cooperating with other security teams in its industry. Informal conversations between like-minded security professionals often lead to better cooperation and communication when the next big cyberthreat comes down the pipeline.

Make no mistake, formal relationships between organizations are — but they are also slow, delicate beasts that require a high level of trust, which takes time to build. Generally speaking, it’s also hard to have a formal relationship with someone who’s going to be across the table from your sales team in the near future. But two security professionals who meet at a local BSides conference or other gathering and form a personal relationship can easily exchange threat data, regardless of whether their companies sell similar products.

An Essential Exercise in Collaboration

At the corporate level, security professionals should be looking to form general security partnerships with organizations such as the Information Technology Information Sharing and Analysis Center (IT-ISAC) or its vertical-specific cousin, the Financial Services Information Sharing and Analysis Center (FS-ISAC). These organizations foster cooperation by allowing representatives to meet in neutral environments, with the expectation that participants will not disclose sensitive information beyond the walls of the meeting place without explicit permission.

Most businesses participate in some kind of relationship and cooperation building within their industry, but the rate of change in the digital world is making this exercise essential. No organization can detect all the threats or understand what those threats mean on its own. It’s up to the individuals who make up those organizations to work together to fight widespread threats and promote a stronger culture of security across all verticals.

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…