Executive Chairman Art Coviello says an attack categorized as an advanced persistent threat has resulted in data being extracted from RSA's IT systems, potentially reducing the effectiveness of current, two-factor authentication.
A roundup of this week's top news: Hackers target RSA's SecurID products. Also, Japan's nuclear crisis: What do you need to know? Plus: New Health Net breach may be biggest ever.
Hackers target RSA's SecurID products, leading federal IT policymakers question America's preparedness for cyberattacks, new House bill would reform federal IT security governance and why Ohio state government decided to standardize on NIST IT security framework.
It's serious news that RSA's SecurID solution has been the target of an advanced persistent threat. But "It's not a game-changer," says Stephen Northcutt, CEO of SANS Institute. "Anybody who says it is [a game-changer] is an alarmist."
"Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.
The announcement by RSA that it had been a victim of an advanced persistent threat shook the global information security industry. Stephen Northcutt of SANS Institute and David Navetta of the Information Law Group offer insight on what happened, what it means and how to respond.
A second California state agency has launched an investigation into insurer Health Net's recent information breach incident that may have affected 1.9 million individuals nationwide.
Insurer Health Net is notifying 1.9 million individuals that their healthcare and personal information may have been breached as a result of nine server drives missing from a California data center managed by IBM.
Virtually every company has protection against email-based viruses and spam. But what about protection of email? Unsecured email travels across the Internet as plain test and can reside for months on multiple servers, vulnerable to interception by hackers and data thieves. You may as well have put it on a postcard...
Businesses today need a technology infrastructure that is highly available, runs on a secure network, and is protected against data loss and unauthorized access. A reliable, responsive, and secure infrastructure is critical to business efficiency and growth. A small chink in your technology armor can damage...
Lengthy downtime, data losses, and security breaches can harm business results, bringing business to a halt: stopping the flow of orders, reducing sales revenue, and interfering with the supply chain. These downtimes could potentially impact a company's ability to compete with other organizations that were unaffected,...
While we still use many of the same old names -- viruses, Trojans and worms -- today's malware deserves much more respect than we are giving it. Today's most sophisticated attacks, known as advanced persistent threats, are thwarting traditional layered security solutions, and a different approach is required. ...
The average cost of a data breach increased 5 percent in 2010 to $214 per compromised record, according to the sixth annual "U.S. Cost of a Data Breach" study by the Ponemon Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.