IBM Designed X-Force Exchange to Foster Cyber Security Intelligence-sharing

Today, IBM has announced a new global cyber threat intelligence sharing platform to make its huge store of about two-decade worth of security and cyber-threat data available to private and public companies.

It is powered by the wisdom and expertise of a worldwide community of cyber security professionals.

Present-day cyber criminals perform their tasks in highly sophisticated, organized and often well-funded networks. They rapidly share data, tools and expertise to launch large, high tech attacks with tremendous ROI. Many of these attacks cannot be detected until after millions of data records or dollars have been stolen.

The company said that it will offer its massive 700-terabyte (and growing) database of raw cyber-threat data and intelligence to companies having demand for it.

“We’re taking the lead by opening up our own deep and global network of cyber threat research, customers, technologies and experts,” said Brendan Hannigan, general manager for IBM Security. “We’re aiming to accelerate the formation of the networks and relationships we need to fight hackers.”

The new social platform, the IBM X-Force Exchange, is designed to foster cyber security intelligence-sharing across companies and industries. It features intelligence from the 15 billion security events, database of nearly 100,000 security vulnerabilities, and intelligence on millions of endpoints, systems, web threats and spam and phishing attacks.

As cyber criminals are becoming more skillful to cause threat to our data as well as to our ability to freely take advantage of mobile computing, e-commerce, the Internet and other advance technology. The company claims that by knowing more about the tools, techniques, and activities of hackers, they will be able to stop them.

The company said, “If we can spread cyber threat intelligence as quickly and widely as the ‘bad guys’ do, we have a chance to fight back against this new face of organized crime.”

However, the US government is also trying to encourage the idea of companies sharing cyber-threat data with the government (and vice-versa) in order to reduce the number of cyber attacks faced by the technology industry.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...