Access "The RSA breach: One year later"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
St. Patrick’s Day will never be the same for executives at RSA. In the world of information security, March 17, 2011 was truly a day of infamy, especially for the millions of end users who trusted the integrity of the ubiquitous RSA SecurID authentication token. On that day, RSA executives had to deliver the announcement they’d likely only imagined in cold-sweat nightmares. One year ago on March 17, RSA executives had to tell the world their flagship intellectual property had been stolen, likely by a well-financed, determined and patient nation-state adversary. One of the world’s best-known security companies had been compromised; RSA, the Security Division of EMC, now was in the shoes of many of its customers. It also ran the risk of becoming an industry punch line. But this was no ChoicePoint situation. They weren’t talking about personal data of 117,000 individuals. This was mission-critical, two-factor authentication technology prevalent in the financial services industry, U.S. government agencies and the country's defense industrial base. Little did RSA... Access >>>
Premium Content for Free.
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
- Unlocking the opportunity of SIEM technology by Andrew Hutchison
The RSA breach: One year later
by Marcia Savage
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
Symantec breach highlights remote management holes
by Robert Westervelt
Poorly configured remote administration tools are a common attack vector, security experts say.
- The RSA breach: One year later by Marcia Savage
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage
After a string of breaches at major security vendors, whom can we trust?
- A framework for big data security by John Kindervag, Contributor
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...