Vulnerabilities / Threats

11/27/2018
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Steve Lipner Appointed Chair of NIST Information Security and Privacy Advisory Board

Wakefield, Mass. – November 15, 2018 – At a meeting this month in Washington, D.C., the U.S. National Institute of Standards and Technology (NIST) announced that Steve Lipner, executive director of SAFECode, has been appointed chair of the Information Security and Privacy Advisory Board (ISPAB).

ISPAB was created by an act of the United States Congress in 1988 and is chartered to advise key U.S. government agencies on information security and privacy issues impacting federal government information systems. Specifically, it works to:

 

  • Identify emerging managerial, technical, administrative, and physical safeguard issues relative to information security and privacy;
  • Advise the National Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information security and privacy issues pertaining to federal government information systems, including thorough review of proposed standards and guidelines developed by NIST.
  • Annually report its findings to the Secretary of Commerce, the Director of the Office of Management and Budget, the Director of the National Security Agency and the appropriate committees of the Congress.

Lipner is serving his third term on the ISPAB, having been one of the original members in 1989-93 and having been reappointed to the Board in 2000-06. This will be his first time serving as Chair.

“I am honored to be appointed Chair of the Information Security Privacy Advisory Board, and look forward to helping the Board continue its work to advance the security and privacy of federal government information systems. The federal government’s use of effective security and privacy practices helps protect U.S. people and organizations and can also serve as a model for organizations and governments worldwide,” said Lipner. 

Lipner joined SAFECode with more than four decades of experience in software security assurance. He led Microsoft’s Security Development Lifecycle team and was responsible for corporate supply chain security strategies and policies regarding government evaluation of Microsoft security products. A member of the National Academy of Engineering and a National Cyber Security Hall of Fame inductee, his contributions to software assurance have influenced the entire security sector. He is named as an inventor on 12 U.S. patents in the field of computer and network security. In addition, he co-authored the book, The Security Development Lifecycle. 

About SAFECode

The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Its members include Adobe Systems Incorporated, CA Technologies, Dell EMC, Intel Corporation, Microsoft Corp., Siemens AG and Symantec Corp. For more information, please visit www.safecode.org.

 

# # #

 

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15380
PUBLISHED: 2019-02-20
A vulnerability in the cluster service manager of Cisco HyperFlex Software could allow an unauthenticated, adjacent attacker to execute commands as the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting to the cluster serv...
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...