• Home
  • Latest
  • Coins2Day 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCyber Saturday

Data Sheet—Saturday, February 13, 2016

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
February 13, 2016, 6:03 PM ET

Last fall I visited IBM’s security group at the company’s offices in New York. A few members of the team had brought me in to show off some “dark web” destinations, hidden websites accessible only via a special browser (called Tor). On the screen before us: weapons, drugs, malicious software—you name it. All for sale.

Needless to say, it’s strange to sit in a conference room with professional contacts when offers for illegal narcotics are quite literally on the table.

The purpose of the meeting was to exchange information about these underground markets. Investigating what so-called crimeware hackers are auctioning online helps analysts (and reporters) keep abreast of the latest cyber threats. This sharing is very much a part of the IBM unit’s business strategy, I learned.

“One of the biggest problems in cybersecurity is hackers collaborating, sharing data and software,” Marc van Zadelhoff, who took the reins of the security group at the beginning of the year, told me later. Previously the unit’s vice president of worldwide strategy and product management, Zadelhoff assumed the top spot after Brendan Hannigan stepped down as general manager. (Hannigan had joined after IBM bought his security intelligence software-maker, Q1 Labs, in 2011.)

“We’re sharing data through X-Force Exchange,” Zadelhoff said, referencing the company’s threat intelligence platform, which IBM opened up for anyone to use free of charge last year. (Other companies like Facebook have taken a similar approach with ThreatExchange, a kind of social network for defenders of computer networks. “Now we’ve added a security app exchange so our partners, vendors, and customers can build and share apps on top.”

Why give away precious data on attackers at no cost? Simple: IBM: aims to commoditize threat intelligence. By giving that intel away, the company hopes to become the foundation on which the information security industry relies. Then the company can use that leverage to sell other services. The bet is that IBM’s analysis, not its endless reams of raw data, will be the moneymaker.

Zadelhoff calls this his three “c” strategy: cloud, collaboration, cognitive. Cloud is the mechanism of distribution; collaboration involves sharing threat feeds and code; and cognitive refers to the value added analysis layer. (Expect announcements involving Watson integrations, the company’s analytic AI engine, this year, I’m told.)

So far the program appears to be working. IBM’s security group posted $2 billion in revenue for 2015, growing 12% over the year prior, according to an earnings report the company issued last month. More than 2,000 organizations are already signed up for the exchange.

Criminals have found a similar strategy—swapping intel and trading off-the-shelf tools—to be quite lucrative of late. Big Blue prudently takes its cue from those baddies. The difference is in the wares: cyber bulwarks versus contraband and botnets.

Robert Hackett

@rhhackett

[email protected]

Welcome to the Cyber Saturday edition of Data Sheet, Coins2Day’s daily tech newsletter. Coins2Day reporter Robert Hackett here. You may reach me via Twitter, Cryptocat, Jabber, PGP encrypted email, or however you (securely) prefer. Feedback welcome.

THREATS

Obama unveils cyber budget. In his budget proposal for the 2017 fiscal year, President Obama has allocated $19 billion to federal cybersecurity. The requested cash injection represents a $5 billion increase over the year prior, and it devotes more than $3 billion to IT upgrades alone. (Coins2Day)

IRS is having a bad week. The Internal Revenue Service said that identity thieves attempted to breach its computer systems to file fraudulent tax refunds. (Last year hackers stole $50 million and personal information of 330,000 people this way.) A couple of days later, one of the agency's employees pled guilty to stealing taxpayers' identities in order to fraudulently collect $1.5 million in tax refunds for herself. (Coins2Day, Coins2Day)

FBI and DHS hacker nabbed?  The alleged hacker who released the personal information of 20,000 Federal Bureau of Investigation agents and 9,000 Department of Homeland Security officials has reportedly been apprehended by UK police. The suspect appears to be a 16-year-old boy. (Motherboard)

Facebook ramps up anti-terror program. The social network has enlisted a team to police posts, weeding the site of content that could be interpreted as promoting terrorism. The team is under pressure from government officials to delete accounts associated with extremism, and to promote anti-radical views. (Coins2Day, Wall Street Journal)

Bill proposes banning "backdoors." Lawmakers introduced a proposal in the House of Representatives that aims to prohibit government from mandating that encryption products be built with "backdoors." One reason for rejecting these inherent weaknesses,which  were intended to give law enforcement officers access to data during investigations: the U.S. Cannot stop other countries from making strongly encrypted tools. (Coins2Day, Coins2Day)

Google to ban Flash ads and expand "right to be forgotten." The search giant said that it plans to put the kibosh on buggy Adobe Flash-based ads by 2017, favoring HTML5-based ads instead. The company is also taking a harder line in enforcing Europe's "right to be forgotten" law, scrubbing certain search results "from all Google domains for people searching from the country of the requester," rather than just from the European domains. (Coins2Day, Coins2Day)

Share today's Data Sheet with a friend:
http://coins2day.com/newsletter/datasheet/

Looking for previous Data Sheets? Click here.

ACCESS GRANTED

Can Check Point co-founder Shlomo Kramer strike again?

The small country of Israel is home to an estimated 300 cybersecurity companies, and now yet another one has added to the rising count. Earlier this week, cloud-based network security provider Cato Networks officially emerged from stealth mode.

While the startup has been kept under wraps for months, its founder and CEO is a known entity in security circles. Shlomo Kramer, co-founder of Check Point Software Technologies and Imperva, is hoping to strike big with his latest company, which he says will eliminate the need for the multiple, costly appliances that companies typically plug in to help secure their systems. Many of Kramer’s bets have paid off in the past—not just with the companies that he’s helped found but also with his own investments in the security space (the long list includes WatchDox, Trusteer, and Palo Alto Networks). On the eve of Cato’s launch, Coins2Day caught up with Kramer to ask about Cato’s technology and the current landscape for Israeli security startups... Read the rest on Coins2Day.com.

TREATS

Malware Museum. A gallery of retro computer viruses. (Washington Post)

Boosting stadium security.  With mobile ID-linked tickets. (TechCrunch)

Cotton swabs. Are more challenging than cybersecurity. (Coins2Day)

Anti-languages. What "jarkmans" and "bawdy baskets" speak. (BBC Future)

NASCAR fans.  Prefer Trump and Clinton. (Fusion)

FORTUNE RECON

Who Needs 4G? AT&T Set to Test 5G by Don Reisinger

This Counter-Drone System Will Safely Hijack and Capture Rogue Drones by Clay Dillow

How Couples Work Together Without Killing Each Other by Valentina Zarya

Does the U.S. Need New Rules for Workers in the Gig Economy? By Anne Fisher

The Oil Industry Is Freaking Out and You Should Too by Chris Matthews

Target, Best Buy, and B&H Slash Prices on Apple Watches by $100 by Philip Elmer-DeWitt

ONE MORE THING

Whatever happened the Sony hackers? According to a couple of computer security researchers who investigated the group's idiosyncratic hacking techniques, the Sony breachers are alive and well—and still hacking. (Wired)

EXFIL

"In the future, intelligence services might use the [Internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials."

Director of National Intelligence James Clapper, testifying before the Senate on Tuesday with an assessment of the many threats the nation faces. The U.S. Spy chief said that the intelligence community might begin to exploit a burgeoning set of Internet-connected consumer devices and sensors to snoop on people. Internet of things? More like surveillance of things. (Coins2Day, Coins2Day)

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

U.S. President Donald Trump speaks to the press, saying he's talking to NATO about Greenland, before he departs the White House en route Palm Beach, Florida on January 16, 2026, in Washington DC, United States.
PoliticsGreenland
The weak business case for Trump acquiring Greenland: a $1 trillion price tag and few returns for two decades
By Jordan BlumJanuary 17, 2026
19 hours ago
boardroom
CommentaryCorporate Governance
When AI decides how shareholders vote, boards need to rethink governance
By Jane SadowskyJanuary 17, 2026
19 hours ago
The CEO of Informatica, Amit Walia
SuccessCareers
Like DoorDash and Google’s CEOs, $7.6 billion Informatica boss is a McKinsey alum—he says being ‘pushed around’ by smart consultants helped him grow
By Emma BurleighJanuary 17, 2026
21 hours ago
photo of western union store
CryptoCryptocurrency
Stablecoins will shake up the $900 billion remittance market—setting up a fight between crypto firms and legacy brands like Western Union
By Carlos GarciaJanuary 17, 2026
21 hours ago
InnovationThe Boring Company
Exclusive: Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno
By Jessica MathewsJanuary 16, 2026
1 day ago
AIOpenAI
ChatGPT tests ads as a new era of AI begins
By Sharon GoldmanJanuary 16, 2026
1 day ago

Most Popular

placeholder alt text
Newsletters
The oil CEO who stood up to Trump is a follower of the disciplined 'Exxon way' and has a history of blunt statements
By Jordan BlumJanuary 13, 2026
5 days ago
placeholder alt text
Politics
The Nobel Prize committee doesn't want Trump getting one, even as a gift—but they treated Obama very differently
By Nick LichtenbergJanuary 16, 2026
1 day ago
placeholder alt text
Banking
'Absolutely, positively no chance, no way, no how, for any reason': Dimon says he'd never run the Fed but 'would take the call' to lead Treasury
By Jacqueline MunisJanuary 16, 2026
2 days ago
placeholder alt text
Economy
America’s $38 trillion national debt is so big the nearly $1 trillion interest payment will be larger than Medicare soon
By Shawn TullyJanuary 15, 2026
3 days ago
placeholder alt text
Success
Jensen Huang tells Stanford students their high expectations may make it hard for them to succeed: 'I wish upon you ample doses of pain and suffering'
By Orianna Rosa RoyleJanuary 16, 2026
2 days ago
placeholder alt text
Innovation
Exclusive: Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno
By Jessica MathewsJanuary 16, 2026
1 day ago

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.