RSA Secure ID vulnerability

Like erstwhile forts, security relies upon defense in depth and also upon the security of other infrastructure elements, that a particular service depends on. If the crocodiles in the moat around the fort die, then you have a vulnerability that can compromise the security of the fort. Therefore, this item http://news.cnet.com/8301-1009_3-20044775-83.html?tag=nl.e757 illustrates a key element, that a core component’s security is reliant upon the security of other components that support it.

Leave a Reply

  

  

  

Blue Captcha Image
Refresh

*

October 2019
M T W T F S S
« Sep    
 123456
78910111213
14151617181920
21222324252627
28293031