Cloud

3/23/2016
12:40 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

What The Feds Said At RSA

A look at some of the insights top US government officials from the White House, DoD, NSA, FBI, and other agencies shared at the RSA Conference in San Francisco last month.
Previous
1 of 9
Next

Source: iStock
Source: iStock

US government officials were all over the RSA Conference this year--many as guest speakers and panelists—including White House cybersecurity coordinator Michael Daniel, Secretary of Defense Ash Carter, and various officials from the Department of Homeland Security, the FBI, NSA, and the US Secret Service.

If there was one theme that their talks and comments had in common, it was that they were all keen on demonstrating a more open government that really gets that it must partner with the cybersecurity industry. That means declassifying and sharing more of its own threat intelligence, working more closely with organizations hit by cyberattacks (and before they’re in full incident response mode), and closer ties to the researcher community.

As Defense Secretary Ash Carter put it when announcing the department's unprecedented bug bounty pilot at the RSA Conference, DoD technologists need to “think outside the five-sided box.”

Here’s a look at what some of the federal government officials said at RSA that shows they may well be thinking outside the Nation’s Capital in their cybersecurity policies and efforts.

 

 

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Click here for pricing information and to register.

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/27/2016 | 11:33:37 AM
New Dept?
I wonder if Daniel's (et al.) comments suggest a paving of the way for a Department of Cybersecurity or something of the like (which, at this point, I'm not sure is a bad idea; DoD and Homeland could certainly stand to have some help).
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Compliance and Risk Management Officer, AvePoint, Inc,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15601
PUBLISHED: 2018-08-21
apps/filemanager/handlers/upload/drop.php in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism.
CVE-2018-15603
PUBLISHED: 2018-08-21
An issue was discovered in Victor CMS through 2018-05-10. There is XSS via the Author field of the "Leave a Comment" screen.
CVE-2018-15598
PUBLISHED: 2018-08-21
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
CVE-2018-15599
PUBLISHED: 2018-08-21
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
CVE-2018-0501
PUBLISHED: 2018-08-21
The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.