Qualys Pumps $500,000 Into Net Security CollaborativeQualys Pumps $500,000 Into Net Security Collaborative
Trustworthy Internet Movement aims to accelerate progress against tough problems like botnets, cloud security, announced Qualys CEO in RSA keynote.
March 2, 2012
If 2011 was the year of the data breach, then 2012 will be "the year of data breaches to the power of two." So said Qualys CEO Philippe Courtot Thursday in a keynote he used to unveil his company's leadership in a nonprofit initiative that he hopes will help bring some sanity to Internet security in 2013 and beyond. Called the Trustworthy Internet Movement (TIM), the group will start up with $500,000 in seed money from Qualys, in an effort to more quickly mobilize against a changing threat environment.
"We are like the French fighting the German Panzers with the Maginot Line and French cavalry," he said. "So, not very effective against a motorized enemy."
Courtot reported that the initiative has already garnered the backing of security visionaries such as Vint Cerf who have the goal of tackling very targeted problems plaguing organizations today, such as botnets, inadequacies in SSL, and a lack of security participation in cloud deployments. The idea, he said, is to put the fast movers in security innovation together in a collaborative force that will allow them to circumvent some of the more staid machinery of security progress.
"We're not going to boil the ocean. We're going to pick our battles and the way that the Trustworthy Internet Movement will be judged is by how we can influence and get things done by not only integrating the papers and conferences and discussions, but also putting the right people together to sow these seeds and leverage new technology very quickly," Courtot said.
[ See our complete RSA
Read more about:2012
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage
Get the Gartner Report: SOC Model Guide