Access your Pro+ Content below.
Cybersecurity information sharing initiatives on the rise
This article is part of the Information Security magazine issue of June 2012
When credit card processor Heartland Payment Systems suddenly saw an uptick in fraud coming from outside the United States last year, the company didn’t just quietly handle it internally In the past, the company would have referred the issue to its internal security team to analyze and recommend an action. This time, John South, the company's chief security officer, had other options: He contacted members of the Payments Processing Information Sharing Council (PPISC), a group formed in 2009 that brought together Heartland and its competitors in the industry to share information on threats attacking their systems. He described what the company was seeing and how the attackers were operating. “We were able to validate that other processors were seeing the same pattern and then take that pattern information directly to the U.S. Secret Service to help them and educate them in regards to the mechanism the attackers were using,” South says. Because the incidents are still under investigation by law enforcement, South declined to ...
Access this PRO+ Content for Free!
Features in this issue
Businesses and government agencies work to improve sharing of cyberthreat information.
Capabilities such as encryption and DLP can be complicated in the cloud.
SIMs aren’t just for network monitoring anymore.
Legislation designed to provide the federal government with threat data from the private sector gains steam.
Columns in this issue
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more.
Security expert Marcus Ranum talks with Brian Chess, formerly of HP, about coding practices and security.
Enterprises need an agile risk management strategy to deal with today’s evolving threats.