Earlier this year, President Obama held a Summit on Cybersecurity and Consumer Protection where he challenged public and private sector leaders to work together to protect American consumers and companies from the growing threat of cyberattacks. This outreach comes as several other key pieces are falling into place. Just this summer, the Congress is moving on new legislation to provide liability protection to private and public entities sharing cyber threat intelligence. Add to this the increasing adoption of new automated cyber threat sharing standards STIX and TAXII, and we have the roadmap to successfully sweep away some of the digital weeds that criminal and nation state hackers use to launch attacks that undermine our trust in the Internet.

However, President Obama correctly stated that government efforts alone will have little effect unless enterprises also step up to the challenge of sharing their cyber threat intelligence. Unfortunately, despite some notable exceptions like the Cyber Threat Alliance, organized cyber threat sharing efforts among U.S. companies to date has been sporadic. There are pockets of private sector threat sharing, but these are often focused on particular sectors (such as the financial industry) and are primarily built upon relationships among trusted partners rather than a scalable system that is required for protection throughout the ecosystem. Ironically, threat sharing within the security industry has traditionally lagged behind other sectors. This reluctance is largely due to concerns about competition and an antiquated belief that threat intelligence indicators should comprise the sole basis upon which security companies differentiate themselves. These entrenched mindsets have built barriers towards developing an infrastructure by which private and public entities can share information they’ve gleaned about cyberattacks.

I realize the idea of sharing information between security companies (many of which are direct competitors) goes against decades of competitive behavior. But to those who feel that the information they’ve learned from their own experiences with cyberattacks provides a competitive advantage, I’d say your thinking is short sighted. Here’s why.

Threat Intel Has a Short Shelf Life – As soon as an enterprise identifies and mediates one attack signature, hackers will quickly develop another one to take its place. In a rapidly changing environment like this, the value of shared threat intelligence often has a very short shelf life. So rather than keep information about a cyberattack to themselves, companies should share information with others that would benefit from it. Limiting the effective breadth of a cyberattack forces hackers to spend more time developing new attack methods and less time using established ones to steal data or disrupt business. The company your threat intel helps today may very well share the intel that helps your company stop a cyberattack tomorrow.

AI Weekly

The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.

Included with VentureBeat Insider and VentureBeat VIP memberships.

Your Feed’s not as Effective as You Think – The 2015 Verizon Data Breach Report notes that among feeds they studied, there was only minor overlap, meaning a customer would need access to all the feeds for any real benefit against KNOWN threats. Rather they state, “there is a need for companies to be able to apply their threat intelligence to their environment in smarter ways so that even if we cannot see inside the whole lake, we can forecast which parts of it are more likely to have a lot of fish we still haven’t caught.” The real value of threat intelligence sharing is its ability to increase the effectiveness of companies’ unique solution. As threats are exposed, sharing information about them with a continuously expanding network of companies will ensure more experts are working on finding a way to mediate a threat. And once a fix is discovered, the larger the threat intelligence network, the more quickly that fix will be implemented and further degrade the ability of cyberattackers to cause harm.

Customers Want Action, Not an Excuse – There are fewer and fewer excuses left for security companies not sharing threat information. At the end of the day, enterprises know their future success is contingent upon providing customers with a safe, predictable user experience. Even the US Department of Justice issued guidance last year exempting the sharing of cyber threat intelligence from antitrust concerns. It’s irresponsible for companies not to take advantage of any activity that could help them better protect their customers.

Some in the security industry get this and believe it’s time to quit stalling and get to work. Palo Alto Networks, Fortinet, Intel Security, and Symantec established the Cyber Threat Alliance in order to share cyber threat intelligence for the purpose of a more cyber secure community. But these are just a few of the many companies with access to threat intelligence that could benefit the larger cyber ecosystem. I strongly encourage technology vendors, government agencies, non-profit groups, and corporations to visit http://cyberthreatalliance.org/ to learn how they can help the effort to build a safer, more reliable cyber infrastructure.

Whether or not an attack is successful depends on how ready we are to defend against it. So would you rather deal with the problem on your own, fingers crossed in the hope that your customers don’t have a bad day? Or would you rather be part of an organized network of enterprises united in the fight to stop cyberattacks, a network that includes companies who have already dealt with the attack you’re currently facing and know how to stop it?

The choice is obvious, now it’s time to act.

Davis Hake is Director of Cybersecurity Strategy at Palo Alto Networks.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More