Security alliance chock-full of holes
There's little chance that these vendors can disclose hack attempts against customers or inherent vulnerabilities in their applications. This leaves IT-ISAC with such thankless tasks as trying to data-mine hackers' IP addresses to figure out which hackers are attacking more than one company. In other words, the data they gather won't be valuable.
The link for this article located at ZDNet / eWeek is no longer available.