Security Basics mailing list archives
Re: RSA Compromise
From: techfrancis () gmail com
Date: Fri, 1 Apr 2011 22:38:56 +0000
Navin, This is not an easy question to answer. It is very dependent on how you have SecurID deployed in you environment. If you use it for remote users, than you should place some counter measures in place. For example a policy for users to contact someone onsite before access is granted. You could increase the auditing if you are not conducting aggressive auditing already. Do you allow remote access to a single identified host and than have users login to the environment? As you can see this all depends on how your posture is already. Techfrancis Sent on the Sprint® Now Network from my BlackBerry® -----Original Message----- From: navin1406 () yahoo com Sender: listbounce () securityfocus com Date: Fri, 1 Apr 2011 19:49:23 To: <security-basics () securityfocus com> Reply-To: navin1406 () yahoo com Subject: RSA Compromise Hi Guys, How serious does the RSA breach looks like and what proactive measures should we take to mitigate exposure if any? Thanks, Navin Sent on my BlackBerry® from Vodafone
Current thread:
- RSA Compromise navin1406 (Apr 01)
- RE: RSA Compromise Valin, Christian (Apr 05)
- Re: RSA Compromise Ivan . (Apr 05)
- Re: RSA Compromise Spacerat (Apr 05)
- RE: RSA Compromise Chris Weber (Apr 05)
- Re: RSA Compromise navin1406 (Apr 05)
- Re: RSA Compromise techfrancis (Apr 05)
- RE: RSA Compromise faruk (Apr 05)
- Re: RSA Compromise Juan Morales (Apr 07)
- Re: RSA Compromise Benjamin Kenneally (Apr 07)
- Re: RSA Compromise amolarakh (Apr 07)