Source |
CybeReason |
Identifiant |
3269337 |
Date de publication |
2021-08-23 12:01:58 (vue: 2021-08-23 12:05:43) |
Titre |
Malicious Life Podcast: Ten Years On - Are We Doing Security Right? (Recyclage) |
Texte |
The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data. It was March of 2011, and security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecurID product. |
Notes |
|
Envoyé |
Oui |
Condensat |
2011 access apt are attack attackers been breached but client company compromised cryptographic data decrypt doing flagship gained had keys knew leadership life malicious march needed podcast: product related right rsa securid security sensitive sophisticated style target ten unknown vendor whether years |
Tags |
Guideline
|
Stories |
|
Move |
|
Source |
CybeReason |
Identifiant |
2830819 |
Date de publication |
2021-05-24 12:03:41 (vue: 2021-05-24 14:05:50) |
Titre |
Malicious Life Podcast: The Untold Story of the RSA Breach Part 2 (Recyclage) |
Texte |
In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product, a solution that was in-use by thousands of high-profile clients around the world including the U.S. government and an array of U.S. defense contractors.
The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data.
In this second episode (listen to Part 1 here) of the Malicious Life Podcast, host Ran Levy is joined by two former RSA executives who were integral to the company's incident response at the time of the attacks and only recently were released from a 10-year NDA that barred them from discussing the incident.
For the first time, they elaborate in detail on how the events unfolded and share the untold story behind one of the most impactful attacks of all time - check it out... |
Notes |
|
Envoyé |
Oui |
Condensat |
2011 access all apt around array attack attackers attacks barred been behind breach breached but check client clients company compromised contractors cryptographic data decrypt defense detail discussing elaborate episode events executives first flagship former from gained government had here high host how impactful incident including integral joined keys knew leadership levy life listen malicious march most nda needed one only out part podcast podcast: product profile ran recently related released response rsa second secureid security sensitive share solution sophisticated story style target them thousands time two unfolded unknown untold use vendor whether who world year |
Tags |
Guideline
|
Stories |
|
Move |
|