PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2012

Lessons learned from VeriSign, Symantec breaches

If 2011 proved anything, it was that security vendors are clearly in the crosshairs of hackers and cybercriminals: Security giant RSA, HBGary Federal, digital certificate authorities Comodo and DigiNotar all fell victim. Then not even a week into 2012, news broke that attackers compromised another industry giant, Symantec. Then only a month later, news hit of another breach, this time VeriSign. So the trend continues. These breaches hit the industry hard. They’re not just about some exposed credit card numbers or email addresses, but in some cases, threaten the core technology organizations rely on. In the case of RSA and theft of SecurID-related IP, the impact was far reaching for its customers and the industry as a whole [see p. XX for our in-depth analysis]. The CA compromises eroded trust in the CA system overall. Fallout from the Symantec breach continued to unfold in early February, after a hacker released the source code for the company’s pcAnywhere software. In January, the company took the drastic step of telling ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue