Feeds

Microsoft brings own security info exchange to the world

'Interflow' will allow pros to network and share machine-readable bug data

Beginner's guide to SSL certificates

Microsoft has announced a “a security and threat information exchange platform for analysts and researchers working in cybersecurity.”

Dubbed “Interflow”, Redmond says the new service is “a distributed system where users decide what communities to form, what data feeds to bring to their communities, and with whom to share data feeds.”

The Azure-based service “uses industry specifications to create an automated, machine-readable feed of threat and security information that can be shared across industries and groups in near real-time … to help security professionals respond more quickly to threats.” Microsoft also hopes the new service will “... help reduce cost of defense by automating processes that are currently performed manually.”

The service is currently in a private preview, but those invited won't be breaking in something entirely new as Microsoft's announcement about the service says Microsoft's own security teams have been using it for a while.

Redmond also says it “is planning to share the security and threat data used to protect our own products and services with the Interflow communities during the private preview.”

Interflow looks to be an heir and enhancement to Microsoft's Active Protections Program, which the company is still fond of but feels could use with some improvements because “data exchange difficulties – format mismatches, governance issues, and the complexity of data correlation – stand in the way of a more efficient incident response industry.”

The private preview is open to organisations operating “dedicated security incident response teams”. ®

Remote control for virtualized desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.