Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:26 PM
George V. Hulme
George V. Hulme

RSA: Experts Urge Cybersecurity Collaboration, Quality Assurance

An important theme within the conversation at RSA Conference 2010 has been finding ways for the government and private industry to better collaborate when it comes to fighting cyberthreats.

An important theme within the conversation at RSA Conference 2010 has been finding ways for the government and private industry to better collaborate when it comes to fighting cyberthreats.Part of the collaborative effort between government and the private sector must include increased transparency through data sharing. With more shared data about attack trends, mitigation techniques, and security strategies that worked (as well as those that did not) everyone should be able to more effectively protect their systems. "We must all partner together to make sure cybersecurity is secure," said White House Cybersecurity Coordinator, Howard Schmidt yesterday in his keynote address at the RSA Conference.

For the government's part in increasing transparency, Schmidt announced the availability of unclassified portions of the Obama administration's Comprehensive National Cybersecurity Initiative (CNCI). InformationWeek's Thomas Claburn covered the event in this story that ran yesterday.

The unclassified CNCI document, available here, goes into some depth explaining the nation's effort to harden public and private networks.

During his presentation Schmidt also noted several times how "collective knowledge" is the most powerful tool we have available to us to combat cyberattacks. And another security expert I had the pleasure to speak with at the conference, retired Secret Service agent Robert Rodriguez, would certainly agree with Schmidt's sentiment. As chairman and founder of the Security Innovation Network (SINET), Rodriguez is currently working to help government agencies, system integrators and private industry to bridge the gap between Silicon Valley and Washington D.C.

An important part of filing that gap is making it easier for security vendors be able to reach the government market. "We need to capture the entrepreneurial spirit and innovation occurring in Silicon Valley and the IT security community and help the U.S. government become early adopters of the best-in-class technologies," Rodriguez said.

Helping the government find and eventually embrace that technology, as well as educating the IT security community on the varying needs of the U.S. government is one of the primary goals of SINET's IT Security Entrepreneur's Forum to be held at Stanford University March 16 and 17.

While leveraging the best security technologies is going to be a part of the solution to the current IT security crises we face - it isn't going to solve the problem by itself.

During the RSA Cryptographers' Panel, former National Security Agency technical director of information assurance Brian Snow urged IT vendors to build more secure and sustainable systems. "The cure is to ask vendors to start building more quality into their implementations," Snow said. "Building quality systems can be a commercial advantage. Don't just sit there until you see an attack underway to fix a problem."

It's a message Snow has advocated for some time. This [.pdf] is from a paper Snow published a number of years ago:

When will we be secure? Nobody knows for sure but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, and appropriateness for use. Such assurances are lacking in most of today's commercial security products and services.

Unfortunately, it's true of most of today's IT applications - not just security products. And it's way past time for this sorry condition to improve. And it's one that requires collaboration to fix, too. Because an effort nothing short of government agencies and large commercial IT buyers forcing vendors to build security assurance into their products - before acquiring them- will affect the change we need.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.
PUBLISHED: 2020-08-05
The ATOS/Sips (aka Atos-Magento) community module 3.0.0 to 3.0.5 for Magento allows command injection.
PUBLISHED: 2020-08-05
In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime pa...