Qualys Pumps $500,000 Into Net Security Collaborative
Trustworthy Internet Movement aims to accelerate progress against tough problems like botnets, cloud security, announced Qualys CEO in RSA keynote.
If 2011 was the year of the data breach, then 2012 will be "the year of data breaches to the power of two." So said Qualys CEO Philippe Courtot Thursday in a keynote he used to unveil his company's leadership in a nonprofit initiative that he hopes will help bring some sanity to Internet security in 2013 and beyond. Called the Trustworthy Internet Movement (TIM), the group will start up with $500,000 in seed money from Qualys, in an effort to more quickly mobilize against a changing threat environment.
"We are like the French fighting the German Panzers with the Maginot Line and French cavalry," he said. "So, not very effective against a motorized enemy."
Courtot reported that the initiative has already garnered the backing of security visionaries such as Vint Cerf who have the goal of tackling very targeted problems plaguing organizations today, such as botnets, inadequacies in SSL, and a lack of security participation in cloud deployments. The idea, he said, is to put the fast movers in security innovation together in a collaborative force that will allow them to circumvent some of the more staid machinery of security progress.
"We're not going to boil the ocean. We're going to pick our battles and the way that the Trustworthy Internet Movement will be judged is by how we can influence and get things done by not only integrating the papers and conferences and discussions, but also putting the right people together to sow these seeds and leverage new technology very quickly," Courtot said.
The genesis of the initiative came from the IT practitioners, Courtot said, who have become frustrated at the IT industry's stasis within the vendor community.
"All of them are frustrated by the current vendors, whether they're enterprise vendors or technology vendors or security vendors, the customers are frustrated," he said. "They are too expensive, they don't work, they don't integrate, et cetera. So they really welcome the initiative and have encouraged me to do this."
The most frustrating part of the scenario, he said, is the fact that many innovators have already come up with ways to tackle the tough problems in Internet and cloud security.
Published: 2015-08-30 The IPsec SA establishment process on Innominate mGuard devices with firmware 8.x before 8.1.7 allows remote authenticated users to cause a denial of service (VPN service restart) by leveraging a peer relationship to send a crafted configuration with compression.
Published: 2015-08-30 Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vect...
Published: 2015-08-30 Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
Published: 2015-08-29 Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token...
Published: 2015-08-29 The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point i...