Exiting out the backdoor

In late December it was revealed that RSA allegedly implemented flawed encryption technology to enable an NSA back door into its tokens. As a result of this, a few key speakers at this year’s RSA 2014 conference are backing out of their speaking commitments in protest of RSA’s actions.

While understanding the rationale behind F-Secure’s decision to not participate and the spirit in which they’re doing it, I’m not convinced it’s the right move. If anything, it could be a missed opportunity to rail against exactly what was alleged to have transpired since the topic of Mikko Hypponen’s discussion was “Governments as Malware Authors.”

In my view, it would seem like the perfect opportunity to have that particular discussion and call out RSA on its own turf to demonstrate how no vendor is immune to what has allegedly happened in terms of the nefarious dealings with the NSA.

There are plenty of questions about what has happened with the NSA, security vendors and other large IT vendors and RSA is the perfect forum for those discussions to take place; at an event where everyone is talking about security.

Given all the discussions raging on about how much people and organizations can trust IT vendors, one thing I will point out, as I pointed out previously, WinMagic (a private, Canadian-based company), has not enabled any backdoors for anyone in our software.

We’ll also be at RSA Conference 2014 – as attendees. If you’d like to connect with us, there will be a number of places you can find us including the TCG Sessions on Monday, Feb. 24th.

Previous Post
Happy New Year from WinMagic
Next Post
Connect with us!

Related Posts

Oh, so you stop hackers and stuff?

What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from…
Read more

BASH – Shellshock

BASH Shellshock has been all over the news lately, and has come to the attention of our security conscious customers (which is pretty much all of them.) There are lots and lots of blogs out there on it, a Wikipedia…

Pre-Boot Network Authentication

Being an IT administrator can be very challanging, with many responsibilities ranging from making sure every employee has the proper working tools required to do their jobs to keeping corporate data safe. Some of the simplest tasks faced by IT…
Read more

What is going on in Healthcare?

I’ve talked about data breaches due to a lost laptop before. They’re common, painful and usually generate horrible publicity. It continues to be alarming how many of these devices that are lost continue to be unencrypted. Looking around lately, there’s…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu