Vulnerabilities / Threats
3/2/2012
09:33 AM
Connect Directly
RSS
E-Mail
50%
50%

Qualys Pumps $500,000 Into Net Security Collaborative

Trustworthy Internet Movement aims to accelerate progress against tough problems like botnets, cloud security, announced Qualys CEO in RSA keynote.

If 2011 was the year of the data breach, then 2012 will be "the year of data breaches to the power of two." So said Qualys CEO Philippe Courtot Thursday in a keynote he used to unveil his company's leadership in a nonprofit initiative that he hopes will help bring some sanity to Internet security in 2013 and beyond. Called the Trustworthy Internet Movement (TIM), the group will start up with $500,000 in seed money from Qualys, in an effort to more quickly mobilize against a changing threat environment.

"We are like the French fighting the German Panzers with the Maginot Line and French cavalry," he said. "So, not very effective against a motorized enemy."

Courtot reported that the initiative has already garnered the backing of security visionaries such as Vint Cerf who have the goal of tackling very targeted problems plaguing organizations today, such as botnets, inadequacies in SSL, and a lack of security participation in cloud deployments. The idea, he said, is to put the fast movers in security innovation together in a collaborative force that will allow them to circumvent some of the more staid machinery of security progress.

"We're not going to boil the ocean. We're going to pick our battles and the way that the Trustworthy Internet Movement will be judged is by how we can influence and get things done by not only integrating the papers and conferences and discussions, but also putting the right people together to sow these seeds and leverage new technology very quickly," Courtot said.

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The genesis of the initiative came from the IT practitioners, Courtot said, who have become frustrated at the IT industry's stasis within the vendor community.

"All of them are frustrated by the current vendors, whether they're enterprise vendors or technology vendors or security vendors, the customers are frustrated," he said. "They are too expensive, they don't work, they don't integrate, et cetera. So they really welcome the initiative and have encouraged me to do this."

The most frustrating part of the scenario, he said, is the fact that many innovators have already come up with ways to tackle the tough problems in Internet and cloud security.

Read the rest of this article on Dark Reading.

Secure Sockets Layer isn't perfect, but there are ways to optimize it. The new Web Encryption That Works supplement from Dark Reading shows four places to start. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.