Feeds

Hacker fighting club launched by IT bigwigs

MS, Oracle, Intel et al share security secrets

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

Some of the biggest names in the US high tech sector have put aside their differences to launch a cyber-crime fighting club.

Nineteen companies, including Microsoft, Oracle and Intel, have formed the Information Technology Information Sharing and Analysis Centre (IT-ISAC). The idea is that members will share security secrets on hacking threats, as well as reveal weaknesses in their company software and hardware. They will also swap information with the government.

Members have contributed a total of $750,000 to start the non-profit centre, run by Atlanta-based Internet Security Systems. It will offer 24/7 advice to members, alerting them to potential hack attacks and vulnerabilities.

Latecomers will have to cough up $5,000 per year to join the organisation.

Speaking today in Washington, Commerce Secretary Norman Mineta, said: "We cannot sit idly by and let this [e-commerce] be a target for hackers."

Mineta, no doubt warming up to his upcoming role as Transportation Secretary in the Bush administration, said the move was: "Sending a strong signal to would-be attackers that we are not going to let them get away with cyber-terrorism. We stand united."

While a good idea in theory, it will be interesting to see if the group works. Despite its title - dubbed "a terrible name" by Richard Clarke, national coordinator for security, infrastructure protection and counter-terrorism - the group faces another major hurdle. Can bitter foes such as Microsoft and Oracle really be trusted to put aside their wrangles and share secrets about weaknesses in their company systems?

It is not long since Oracle admitted rummaging in Microsoft's garbage for confidential tit-bits.

But in the days of cyber-terrorism that's all in the past. There wasn't a dry eye in the house as Mary-Ann Davidson, Oracle security product manager, launched into here speech today: "No man is an island. And nowhere is this more apparent than in protecting the nation's infrastructure."

"Every one of us has been or will be attacked in cyberspace," she said. "A threat against one is truly a threat against all." ®

Related Stories

Catch a hacker, win a book
Feds find pro-Napster hacker
Boots hacked
Windows is most-hacked Webserver
Egghead doubts hackers got the goods
Ellison offers Gates all his rubbish

The Power of One Infographic

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.