This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Qualys Pumps $500,000 Into Net Security Collaborative
Trustworthy Internet Movement aims to accelerate progress against tough problems like botnets, cloud security, announced Qualys CEO in RSA keynote.
If 2011 was the year of the data breach, then 2012 will be "the year of data breaches to the power of two." So said Qualys CEO Philippe Courtot Thursday in a keynote he used to unveil his company's leadership in a nonprofit initiative that he hopes will help bring some sanity to Internet security in 2013 and beyond. Called the Trustworthy Internet Movement (TIM), the group will start up with $500,000 in seed money from Qualys, in an effort to more quickly mobilize against a changing threat environment.
"We are like the French fighting the German Panzers with the Maginot Line and French cavalry," he said. "So, not very effective against a motorized enemy."
Courtot reported that the initiative has already garnered the backing of security visionaries such as Vint Cerf who have the goal of tackling very targeted problems plaguing organizations today, such as botnets, inadequacies in SSL, and a lack of security participation in cloud deployments. The idea, he said, is to put the fast movers in security innovation together in a collaborative force that will allow them to circumvent some of the more staid machinery of security progress.
"We're not going to boil the ocean. We're going to pick our battles and the way that the Trustworthy Internet Movement will be judged is by how we can influence and get things done by not only integrating the papers and conferences and discussions, but also putting the right people together to sow these seeds and leverage new technology very quickly," Courtot said.
The genesis of the initiative came from the IT practitioners, Courtot said, who have become frustrated at the IT industry's stasis within the vendor community.
"All of them are frustrated by the current vendors, whether they're enterprise vendors or technology vendors or security vendors, the customers are frustrated," he said. "They are too expensive, they don't work, they don't integrate, et cetera. So they really welcome the initiative and have encouraged me to do this."
The most frustrating part of the scenario, he said, is the fact that many innovators have already come up with ways to tackle the tough problems in Internet and cloud security.
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability DatabaseCVE-2019-17435 PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to execute code with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as the re...
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient...