Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Trustworthy Internet Movement to Take on Internet Security

SAN FRANCISCO — RSA CONFERENCE 2012 — Qualys CEO Philippe Courtot is pushing a new initiative aimed at taking on security issues fundamental to the Internet.

The effort will be led by the Trustworthy Internet Movement (TIM), a nonprofit created to take on issues such as SSL governance and the spread of botnets and malware. TIM is built around three core pillars:

SAN FRANCISCO — RSA CONFERENCE 2012 — Qualys CEO Philippe Courtot is pushing a new initiative aimed at taking on security issues fundamental to the Internet.

The effort will be led by the Trustworthy Internet Movement (TIM), a nonprofit created to take on issues such as SSL governance and the spread of botnets and malware. TIM is built around three core pillars:

Trustworthy Internet MovementInnovation: TIM will focus on fostering innovation to solve the hard problems of the Internet via funding new solutions and the provision of appropriate technical assistance and resources to address them.

Collaboration: TIM will provide collaborative frameworks for discussing these problems and working towards solutions through expert and stakeholder working groups. Working group results will be published on a regular basis.

Individual Expertise: TIM will leverage specialized knowledge and expertise from the brightest and best in the industry to guide and support working group developments.

The non-profit is recruiting this week at the RSA Conference in San Francisco, and is looking to draw talent from large corporations and cloud providers, as well as help from the venture capital community. Courtot pledged $500,000 in seed money to get the initiative off the ground.

“With two billion people relying on the Internet for much of their personal and business lives, it is incumbent upon the industry to put its collective heads together and resolve the problems of online security, privacy, and reliability once and for all,” Courtot said in a statement. “This is no longer just an issue of technology but of society as a whole. We have a unique opportunity with the rapid spread of cloud-based services to leverage the power of the industry and the wider community of Internet users to resolve the issues that are holding back the Internet from fulfilling its true potential.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem