Tech giants form cyber security 'supergroup'

Microsoft, Mastercard and others band together to help organisations get through attacks

A handful of major companies in the technology industry have joined forces to establish a non-governmental organisation (NGO) that will aim to hold back the tide of rampant global cyber crime.

The CyberPeace Institute, founded by Microsoft, Mastercard and the Hewlett Foundation, has been set up to decrease the severity and frequency of cyber attacks, and make the internet a much more stable environment generally.

The organisation will tackle this wider objective by aiding and defending victims, analysing and investigating threats, as well as promoting healthy cyber security standards and preventative guidance.

"Governments, the private sector, civil society and academia must be part of discussing solutions and taking concrete steps to protect people," said Microsoft's corporate vice president for customer security and trust, Tom Burt.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Badly needed in the fight against cyber attacks is a credible source of research and analysis about the impact of cyber attacks around the globe on world citizens.

"For years, nongovernmental organizations around the world have provided on-the-ground help and vocal advocacy for victims of wars and natural disasters, and have convened important discussions about protecting the victims they serve.

"It's become clear that victims of attacks originating on the internet deserve similar assistance, and the CyberPeace Institute will do just that."

The head of the European Union's (EU) Internet Referral Unit Stphane Duguin will serve as CEO if the CyberPeace Institute, having previously played an integral role in creating Europol's European Cybercrime Centre (EC3).

She will oversee an eight-member executive board, and a 13-member advisory board, that is made up of leading cyber security experts as well as those with expertise in international law, human rights and international affairs.

Related Resource

Why UEM is the key to enterprise IT security

A guide to effective endpoint security

Download now

"The global disruptions from cyber attacks are the symptoms of an insidious threat targeting civilians at a time of peace," Duguin said.

Advertisement - Article continues below

"We need concrete solutions to build resilience among vulnerable communities, shed light on the malicious activity of attackers and inform responsible behaviour in cyberspace.

"I am looking forward to leading the CyberPeace Institute towards these goals, and engaging academia, civil society, governments and industry in a collective pursuit of peace in cyberspace."

One of the institute's key initiatives will be to mobilise what it calls a CyberVolunteer Network, comprising a community of representatives from the industry, public sector, and academia. This network will work on assisting victims of cyber crime, in the form of an emergency incident response, as well as in longer-term recovery.

The network will also help vulnerable organisations to raise their level of cyber resilience and guard against future attacks. Some of these measures may span identifying dangerous attack trends and providing the tools to help organisations use technology more effectively.

Advertisement
Advertisement - Article continues below

Elsewhere, public awareness campaigns will strive to educate organisations and civilians about the impact of significant cyber attacks. The organisation will also work to find and plug potential gaps in legislation across the world.

Businesses have been struck with a host of emerging cyber threats in recent months. One of these newer threats is known as island hopping, with research showing that half of all attacks now use the mechanism.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/28170/what-is-cyber-warfare
Security

What is cyber warfare?

20 Sep 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020