On the surface, IT-ISAC sounds wonderful, but there's something wrong with this picture. Each of these companies might provide a general idea as to the kinds of attacks that it is receiving. But no company in its right mind will contribute . . .
On the surface, IT-ISAC sounds wonderful, but there's something wrong with this picture. Each of these companies might provide a general idea as to the kinds of attacks that it is receiving. But no company in its right mind will contribute the important stuff, such as specific exploits or a specific vulnerability in its product.

There's little chance that these vendors can disclose hack attempts against customers or inherent vulnerabilities in their applications. This leaves IT-ISAC with such thankless tasks as trying to data-mine hackers' IP addresses to figure out which hackers are attacking more than one company. In other words, the data they gather won't be valuable.

The link for this article located at ZDNet / eWeek is no longer available.