Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking
    • Storage

    RSA Data Breach Highlights Value of Network Forensics Technology

    Written by

    Fahmida Y. Rashid
    Published March 22, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As RSA deals with the data breach where attackers stole information about its two-factor authentication technology, organizations can watch and learn how to deal with these kinds of attacks.

      RSA acknowledged on March 17 in a letter on its Web site about having been hit by an advanced persistent threat, and that some information about SecurID had been stolen. While it quickly assured customers that the theft wouldn’t expose any customers to any direct attacks, the company acknowledged that the one-time password system would be vulnerable as part of a blended attack.

      The letter was vague on details, but suggested customers shore up other aspects of security such as tracking changes in user access and privilege levels as well as educating employees about social engineering attacks.

      RSA is a “great example of what organizations have to do when they figure out they’ve been breached,” Peter Schlampp, vice president of product management for digital forensics firm Solera Networks, told eWEEK.

      The fact that RSA identified the attack and seem to know what was taken is a good sign. “It is very clear to me they have some kind of network forensics technology in place,” Schlampp said. In many cases, when companies discover a breach, they have no idea what was exposed, he said. The tone of the letter makes it clear that RSA knows exactly what was stolen, he said.

      RSA probably knows exactly the origin where the attackers entered the network and the exact instance of the file that was copied, he said. RSA’s network forensics technology would have provided the company’s investigators with the name, location, and contents of the file, as well.

      The company has all the information it needs to identify the attack, say what was stolen, figure out how to prevent it from happening again, and to remediate the breach, according to Schlampp.

      RSA identified the attack as an advanced persistent threat (APT) in its letter. APTs are generally ongoing attacks where the perpetrators are probing the network looking for information. They are not looking for immediate financial gain, but information that can be used to launch further attacks, he said.

      APTs are currently the “biggest threats” facing large organizations, but IT managers and security professionals aren’t talking about it as much, Schlampp said. The RSA breach should encourage organizations to start looking at their infrastructure and at the RSA breach for information on how to deal with this growing threat, he said.

      “If Google and Aurora wasn’t enough of a wake-up call, this is another wake-up call,” said Schlampp. Last year, Google announced it had been subject to ongoing attacks as part of Operation Aurora. A number of other companies were also included in Aurora, although there were other unrelated APT attacks on other large companies, as well.

      APTs highlight the fact that attackers are looking for “new novel ways” to get into the network using advanced and highly targeted techniques, Schlampp said. Organizations need to make sure that their security defenses are collecting all the information so that if a breach occurs they are notified and can immediately perform root cause analysis to determine what happened, he said.

      Schlampp wouldn’t be surprised if RSA started offering network forensics and technology specifically geared towards dealing with APTs in the “coming days,” he said. RSA has shown a lot of “integrity” in stepping up and acknowledging the breach, Schlampp said. That will go a long way towards restoring trust with customers, he suggested.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×