4.8 • 1K Ratings
🗓️ 24 May 2021
⏱️ 30 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Welcome back to Cyber Reasons Malicious Life. I'm Ran Levy. |
0:13.6 | The following is the second in a two-part story about the 2011 RSA breach. |
0:20.8 | In part one we heard from Sam Currie and Dave Kasting Nola about how the breach was discovered |
0:27.7 | by an attentive employee who noticed sensitive data exiting from RSA's servers. |
0:34.6 | Sensitive information regarding secure ID, the company's flagship product, was stolen. |
0:40.9 | It was yet unclear whether the attackers had managed to get hold of the |
0:45.4 | cryptographic key that they needed in order to decrypt the stolen data. |
0:50.3 | If they haven't, RSA was in the clear. But if they did have the key, then hundreds of |
0:56.8 | RSA's clients were at serious risk. |
1:00.1 | RSA's management then had a tough choice to make. Should they disclose what |
1:06.6 | happened and suffer the consequences even though it was possible that no real damage |
1:12.2 | was done or should they maybe keep quiet and hope the |
1:16.7 | whole mess just goes away. |
1:20.0 | Art Kovaleo, RSA's CEO, made the call. We are going to do the right thing, he said. And they did. |
1:30.4 | History has a way of repeating itself. |
1:33.0 | Last December, the New York Times reported a breach at Fire Rye. |
1:38.0 | It was shocking for obvious reasons. |
1:41.0 | Few entities in the world are as secure as a top cybersecurity company like |
1:47.4 | them. It became an even bigger mess when they realized that the fire-ripe breach was just one small part of a much bigger |
1:57.4 | Solowind's supply chain attack. In the month's sense experts have been trying to make sense of such a momentous event. |
2:07.0 | A nation-state supply chain attack that even cyber security companies couldn't stop because they themselves were victims. |
2:17.0 | It's unprecedented, never before seen. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.