Cybersecurity and the Supply Side: Industry Self-regulatory Efforts

Introduction

This article introduces the idea of collective action to improve cybersecurity at the industry level, focusing on how organizations that provide internet services to third parties cooperate to enhance security.

1. The Role of Internet Service Providers in Cybersecurity:

• Organizations that supply internet services are critical players in the cybersecurity ecosystem. These include platform providers like MicrosoftAppleFacebook, and Google, as well as network operatorshosting companies, and domain name registrars.

• These organizations not only protect themselves but also safeguard their customers and the broader internet ecosystem.

2. Supply of Internet Services and Cybersecurity:

• There is a close connection between the supply of internet services and the supply of cybersecurity. Cybersecurity, in many ways, is produced alongside internet access and online services, especially as these organizations work to detectprevent, and mitigate cyber threats.

3. Cooperation Among Internet Firms:

• Even though most internet operators are private competitive businesses, they frequently cooperate to address significant cybersecurity challenges.

• This cooperation takes place in three key areas:

1. Development of Standards.

2. Sharing Threat Information.

3. Joint Collective Action Against Cybersecurity Threats.

4. Standardization Efforts:

• Standards are developed to help govern and guide internet services. Some examples include:

• The Internet Engineering Task Force (IETF) develops voluntary standards for internet operations, including security-related standards like Transport Layer Security (TLS).

• OASIS (Organization for the Advancement of Structured Information Standards), which promotes open standards in information technology, including Security Assertion Markup Language (SAML) for exchanging authentication and authorization data.

• The Payment Card Industry Security Standards Council (PCI-DSS) was formed by major credit card companies to standardize security requirements for payment systems.

5. Threat Information Sharing:

• Many organizations collaborate to share cyber threat intelligence in real-time, which helps them respond quickly to emerging threats.

• Some examples of initiatives include:

• Cyber Threat Alliance: Members like FortinetMcAfee, and Palo Alto Networks share threat data using STIX (Structured Threat Information Expression) packages.

• Spamhaus Project: One of the oldest anti-spam initiatives, it compiles blocklists of verified spam sources.

• Anti-Phishing Working Group (APWG): This nonprofit consortium shares vast amounts of phishing data to help companies protect themselves from cyber threats.

6. Collective Action Against Cybersecurity Threats:

• Industry groups often work together to take down cyber attackers or respond to major incidents:

• Messaging Malware and Mobile Anti-Abuse Working Group (M3AAWG): This group brings together ISPsemail service providerssocial networks, and security vendors to combat messaging abuse like phishing and spam.

• Conficker Working Group: This ad hoc alliance was created in 2008 to combat the Conficker worm, which threatened to become one of the largest botnets in history. It included key players like MicrosoftICANNSymantec, and Georgia Tech researchers.

7. Examples of Cooperative Efforts:

• The Zero Botnet Alliance, co-hosted by Spamhaus and APWG, tracks and shares information about botnet threats.

• Internet service providers (ISPs) also work together to detect and remove botnet malware from their customers.

Conclusion:

The lesson emphasizes how suppliers of ICT services are in a unique position to identifydetect, and act against cybersecurity threats. It highlights how these organizations often cooperate in three key areas — standardizationthreat information sharing, and collective action. Through cooperation, internet firms can better protect both their own operations and the broader online community from cybersecurity incidents.

Published by StasyHsieh

A physicist by training, I’ve traversed seven countries, shaping my path through Cybersecurity, AI, and Astrophysics, while nurturing a deep passion for art, writing, and societal change. I advocate for inclusivity in STEM and explore the intersections of equality, economics, and the evolving digital world. My work—whether in technology or the arts—seeks to provoke thought and inspire change. Let’s connect and explore the dance between innovation and humanity.

Leave a comment