Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 8 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Trusted Internet Movement launches and seeks data sources

by The Gurus
November 22, 2013
in Editor's News
Share on FacebookShare on Twitter

A new movement to encourage sharing of information among trusted users has been launched and is seeking new partners.

Founder Wolfgang Kandek, CTO of Qualys, said that the campaign has stemmed from experiences of security departments typically being policy driven and beholden to following extensive guidelines and not being able to measure programs in a way that is intelligible to their non-technical colleagues.
He said: “We are good at reaching out to people about who is doing security with data as a number of organisations gather data to pilot proposals and know where to go. If you are in financial services you will do reviews and see how the metrics change and see how things are going and we think security should aim to do something similar. Financial services companies are very innovative and I think security can follow that model.”
Kandek told IT Security Guru that the answer is in shifting to data-driven security as by tracking metrics, security professionals around the world have been able to drive behavioural change and ensure that employees embrace security. “We have companies who volunteer information, some anonymously and it is a good thing as it helps others but and you know where you are in the process and assess your values.
“It is intended to show positive things, as most news and data is negative: malware; data breaches; vulnerability – and this is a security posture and it will improve over time. It will help CISOs to judge their performance and monitor their improvements. Moving away from a belief system will help you say to the board that you got better as the amount of vulnerabilities halved and you have an improvement.”
Kandek said that this operation was being done under the Trusted Internet Movement (TIM) banner to make it independent so it is of use to everyone. He said that ten companies had joined the movement since the launch last week and so far, it was working with large companies and government departments. However he was keen to work with small businesses, as many companies say that they have the data and would love to use it to do certain things including measuring their security program.
He said: “The next stage is more data sources, and those doing this are able to say that they are doing this and what they are learning.”
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

850,000 person data stash included credit card numbers in plain text

Next Post

Microsoft warns of targeted attacks against software using TIFF graphics format

Recent News

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato SASE Cloud Named “Leader” and “Outperformer” in GigaOm Radar Report for SD-WAN

February 7, 2023
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

UK second most targeted nation behind America for Ransomware

February 7, 2023
safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information