Security Basics mailing list archives

Re: RSA Compromise


From: techfrancis () gmail com
Date: Fri, 1 Apr 2011 22:38:56 +0000

Navin, 
      This is not an easy question to answer.  It is very dependent on how you have SecurID deployed in you 
environment. If you use it for remote users, than you should place some counter measures in place.  For example a 
policy for users to contact someone onsite before access is granted.  You could increase the auditing if you are not 
conducting aggressive auditing already.  Do you allow remote access to a single identified host and than have users 
login to the environment?  As you can see this all depends on how your posture is already.  

Techfrancis

Sent on the Sprint® Now Network from my BlackBerry®

-----Original Message-----
From: navin1406 () yahoo com
Sender: listbounce () securityfocus com
Date: Fri, 1 Apr 2011 19:49:23 
To: <security-basics () securityfocus com>
Reply-To: navin1406 () yahoo com
Subject: RSA Compromise

Hi Guys,

How serious does the RSA breach looks like and what proactive measures should we take to mitigate exposure if any?

Thanks,

Navin
Sent on my BlackBerry® from Vodafone

Current thread: