Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:26 PM
George V. Hulme
George V. Hulme

RSA: Experts Urge Cybersecurity Collaboration, Quality Assurance

An important theme within the conversation at RSA Conference 2010 has been finding ways for the government and private industry to better collaborate when it comes to fighting cyberthreats.

An important theme within the conversation at RSA Conference 2010 has been finding ways for the government and private industry to better collaborate when it comes to fighting cyberthreats.Part of the collaborative effort between government and the private sector must include increased transparency through data sharing. With more shared data about attack trends, mitigation techniques, and security strategies that worked (as well as those that did not) everyone should be able to more effectively protect their systems. "We must all partner together to make sure cybersecurity is secure," said White House Cybersecurity Coordinator, Howard Schmidt yesterday in his keynote address at the RSA Conference.

For the government's part in increasing transparency, Schmidt announced the availability of unclassified portions of the Obama administration's Comprehensive National Cybersecurity Initiative (CNCI). InformationWeek's Thomas Claburn covered the event in this story that ran yesterday.

The unclassified CNCI document, available here, goes into some depth explaining the nation's effort to harden public and private networks.

During his presentation Schmidt also noted several times how "collective knowledge" is the most powerful tool we have available to us to combat cyberattacks. And another security expert I had the pleasure to speak with at the conference, retired Secret Service agent Robert Rodriguez, would certainly agree with Schmidt's sentiment. As chairman and founder of the Security Innovation Network (SINET), Rodriguez is currently working to help government agencies, system integrators and private industry to bridge the gap between Silicon Valley and Washington D.C.

An important part of filing that gap is making it easier for security vendors be able to reach the government market. "We need to capture the entrepreneurial spirit and innovation occurring in Silicon Valley and the IT security community and help the U.S. government become early adopters of the best-in-class technologies," Rodriguez said.

Helping the government find and eventually embrace that technology, as well as educating the IT security community on the varying needs of the U.S. government is one of the primary goals of SINET's IT Security Entrepreneur's Forum to be held at Stanford University March 16 and 17.

While leveraging the best security technologies is going to be a part of the solution to the current IT security crises we face - it isn't going to solve the problem by itself.

During the RSA Cryptographers' Panel, former National Security Agency technical director of information assurance Brian Snow urged IT vendors to build more secure and sustainable systems. "The cure is to ask vendors to start building more quality into their implementations," Snow said. "Building quality systems can be a commercial advantage. Don't just sit there until you see an attack underway to fix a problem."

It's a message Snow has advocated for some time. This [.pdf] is from a paper Snow published a number of years ago:

When will we be secure? Nobody knows for sure but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, and appropriateness for use. Such assurances are lacking in most of today's commercial security products and services.

Unfortunately, it's true of most of today's IT applications - not just security products. And it's way past time for this sorry condition to improve. And it's one that requires collaboration to fix, too. Because an effort nothing short of government agencies and large commercial IT buyers forcing vendors to build security assurance into their products - before acquiring them- will affect the change we need.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.