Vulnerabilities / Threats
3/2/2012
09:33 AM
Connect Directly
RSS
E-Mail
50%
50%

Qualys Pumps $500,000 Into Net Security Collaborative

Trustworthy Internet Movement aims to accelerate progress against tough problems like botnets, cloud security, announced Qualys CEO in RSA keynote.

If 2011 was the year of the data breach, then 2012 will be "the year of data breaches to the power of two." So said Qualys CEO Philippe Courtot Thursday in a keynote he used to unveil his company's leadership in a nonprofit initiative that he hopes will help bring some sanity to Internet security in 2013 and beyond. Called the Trustworthy Internet Movement (TIM), the group will start up with $500,000 in seed money from Qualys, in an effort to more quickly mobilize against a changing threat environment.

"We are like the French fighting the German Panzers with the Maginot Line and French cavalry," he said. "So, not very effective against a motorized enemy."

Courtot reported that the initiative has already garnered the backing of security visionaries such as Vint Cerf who have the goal of tackling very targeted problems plaguing organizations today, such as botnets, inadequacies in SSL, and a lack of security participation in cloud deployments. The idea, he said, is to put the fast movers in security innovation together in a collaborative force that will allow them to circumvent some of the more staid machinery of security progress.

"We're not going to boil the ocean. We're going to pick our battles and the way that the Trustworthy Internet Movement will be judged is by how we can influence and get things done by not only integrating the papers and conferences and discussions, but also putting the right people together to sow these seeds and leverage new technology very quickly," Courtot said.

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The genesis of the initiative came from the IT practitioners, Courtot said, who have become frustrated at the IT industry's stasis within the vendor community.

"All of them are frustrated by the current vendors, whether they're enterprise vendors or technology vendors or security vendors, the customers are frustrated," he said. "They are too expensive, they don't work, they don't integrate, et cetera. So they really welcome the initiative and have encouraged me to do this."

The most frustrating part of the scenario, he said, is the fact that many innovators have already come up with ways to tackle the tough problems in Internet and cloud security.

Read the rest of this article on Dark Reading.

Secure Sockets Layer isn't perfect, but there are ways to optimize it. The new Web Encryption That Works supplement from Dark Reading shows four places to start. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.