Blog

­

The PSIRT Services Framework: Helping the Industry Protect the Ecosystem

At Cisco, our leadership made the decision over twenty four years ago that we would clearly publicly communicate security vulnerabilities or other issues that could potentially expose customers to risk. This is when the Cisco Product Security Incident Response Team (PSIRT) was born. Our team and the security vulnerability process has evolved to meet customer [...]

ICASI Welcomes New Members – Honeywell & BlackBerry

The Industry Consortium for Advancement of Security on the Internet (ICASI) welcomes new members Honeywell International and BlackBerry Limited into the consortium.  In this increasingly connected ecosystem, industry leaders are banding together to better coordinate vulnerability response, promote security response best practices, and be an active partner with security researchers to make the Internet more [...]

Perspective About the Recent WPA Vulnerabilities

On October 16th, Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access II (WPA2) protocol. These are protocol-level vulnerabilities that affect wireless vendors providing infrastructure devices and wireless clients, which follow the WPA and WPA2 specifications. These vulnerabilities were also referred to as “KRACK” [...]

Evolving Security Disclosures: The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose security vulnerabilities to customers and consumers. [...]

Stetson University Students Discover Potential TCP Vulnerability and Use ICASI to Mitigate

Dr. Dan Plante is a very persuasive guy. Plante serves as professor of Computer Science at Central Florida’s Stetson University. In 2008, to promote collaboration between his students and the university and enhance computer security on campus, he convinced the university to allow him to develop a unique computer and networking class that uses the [...]

Why Digital Threats Are a Worldwide Web Problem

On 8-9 September, 2016, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. Those who attend the event will be able to participate in discussions on the value of threat information sharing as well as learn how to better protect their customers by sharing their experiences with one another. [...]

Cisco bases its new OpenVuln API on ICASI’s CVRF Standard

An eWeek article tells how Cisco’s release of its OpenVuln API, based on the ICASI Common Vulnerability Reporting Framework (CVRF) and other standards, is a further push by the company to make security advisories easier to consume and act upon. Omar Santos, principal engineer of Cisco PSIRT Security Research and Operations and also ICASI’s USIRP [...]

ICASI helps drive first F2F of the Vulnerability Coordination SIG

This week I’m attending the 2015 FIRST Conference in Berlin (www.first.org) to co-chair a meeting of the newly chartered Vulnerability Coordination SIG.  This SIG was born out of issues such as Heartbleed, which highlighted the need for a multi-faceted solution to the difficult challenges of vulnerability coordination across a diverse, global stakeholder community. ICASI recognized [...]

ICASI facilitates conversation around Coordination at FIRST

In support of its efforts to facilitate industry-wide conversation around ways to improve vulnerability coordination, ICASI will be hosting two sessions on the topic during this week’sFIRST Conference in Boston. We encourage anyone who will be at FIRST to stop in and join the discussion. The sessions will be as follows: Panel: Developing a Multi-Faceted [...]

Trust. That’s Why.

The topic of ICASI arises often when I visit customers or talk with folks from both inside and outside of the computer and telecommunications industries. They typically ask a variety of questions ranging from “What is this ICASI thing?” to “Which big vendors are involved?” to the frank but amusing “Really? Advancing the state of [...]