Last year's security breach that cost RSA parent EMC $US66 million ($A61 million) in reparations could happen to any organisation, RSA President and Chairman Art Coviello Jr. said Tuesday.
Since cyber-criminals compromised the company's SecureID tokens, leaving customers open to attack, RSA has been rebuilding the trust customers lost in the company, Coviello said during the opening keynote at the RSA Conference in San Francisco. Over the last 11 months the company has operated with a "sense of urgency" to apply the lessons learned to help drive its strategy and product roadmaps.
While providing no details on the breach, Coviello warned that no organisation is immune from the kind of sophisticated attack suffered by RSA.
"We hope that the attack on us will strengthen the sense of urgency and resolve on everyone," he said. "But the fact is we are not alone."
Since the breach, the company has never seen so many high-profile attacks targeted at single organisations "as a stepping stone to attack others," Coviello said.
"In our interdependent world, we need to understand that an attack on one of us is an attack on all of us," he said. "But together, we can all learn from these experiences and emerge from this hell smarter and stronger than we were before."
RSA disclosed last March that cyber-criminals had attacked its SecureID two-factor authentication tokens. The purpose was to steal information that could be used to breach the network security of defense contractors and government organisations.
At first, RSA said the attack did not present a danger to SecureID customers. Two months later, weapons manufacturer Lockheed Martin publicly confirmed that it was the victim of a "significant and tenacious" cyber attack executed by hackers exploiting a security vulnerability in SecureID tokens used in remote VPN access.
As a result, Lockheed had to shut down its computer systems and re-issue tokens to many of its employees, while requiring a password reset for its 120,000 workers. RSA acknowledged later in the year that the overall cost of the breach was $66 million in reparations to customers.
This article originally appeared at crn.com
Issue: 335 | January/February 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.