SecurID

The Envelope Please: And the Awards Go to … RSA

What do Leonardo DiCaprio and the teams at RSA have in common? Aside from the obvious — good looks and long, distinguished careers – we share one other important characteristic: We both took home heralded industry awards this past week. Leo’s Oscar might have generated a little more buzz. But, make no mistake, the two…

Beware of Greeks Bearing Mobile App Downloads

RSA has been made aware of a new malware attack campaign that targets end-users of online banking applications, which could enable fraudulent wire transactions from victims’ accounts. The attack relies on an Android-based SMS hijacker app that has been branded or “skinned” with RSA SecurID branding to make it appear more credible. This attack targets…

Getting it Right with VDI and BYOD: A Security Driven Approach

Virtual Desktop Infrastructure, or VDI, is a technology that presents desktops or individually entitled applications from a central management server to remote users’ browser-enabled devices over the internet. Think of it as client-server for the new digital age with the chief advantage being that – in these times of the oft painful breach – all…

Passwords don’t work!

I was at a security conference last week and the keynote speaker was addressing the concerns we all share about the security climate…we are losing ground. In his conversation he mentioned that two-factor authentication is a minimum baseline security measure that got a lot of nods in the crowd but completely forgot that statement when he…

RSA SecurID Customers Take Note: RSA Via Access is for You, Too!

Today, RSA announced a milestone – the upcoming 2015 release of RSA Via that includes RSA Via Access  – a new hosted cloud-based authentication service for single sign-on to SaaS and on-premise web applications. This news not only is exciting, it’s game-changing. And it demonstrates that RSA is meeting customer needs for a unified approach to…

Covert Two Factor Authentication: What you can’t see can secure you

We hear a lot about the importance of two factor authentication these days. How every major consumer application – from Gmail to Facebook to Dropbox – offers “stronger than password” protection by using a second factor methodology. Of course, this is important. A simple username and password is never enough.  Hackers guess, use brute force…

Implementing Advanced Authentication to Satisfy CJIS Security Policy Compliance – Podcast #247

IT Director Lesley Chaney of New Hanover County North Carolina joins the Speaking of Security Podcast to talk about her experience with the newly updated Criminal Justice Information Systems (CJIS) Security Policy. Lesley recently led her team to implement RSA SecurID to protect remote access via laptops and mobile devices for more than 270 police…

Still Not Cracked: a further dive into the PKCS #1 v1.5 vulnerability

Contrary to some comments we have seen, RSA is not “walking around” the Project Team Prosecco research as is asserted in a recent Root Labs blog; in fact we have repeatedly stated to bloggers and the press that we support this specific research (as I did here, yesterday) as well as other cryptanalysis.  Our problem…