Exiting out the backdoor

In late December it was revealed that RSA allegedly implemented flawed encryption technology to enable an NSA back door into its tokens. As a result of this, a few key speakers at this year’s RSA 2014 conference are backing out of their speaking commitments in protest of RSA’s actions.

While understanding the rationale behind F-Secure’s decision to not participate and the spirit in which they’re doing it, I’m not convinced it’s the right move. If anything, it could be a missed opportunity to rail against exactly what was alleged to have transpired since the topic of Mikko Hypponen’s discussion was “Governments as Malware Authors.”

In my view, it would seem like the perfect opportunity to have that particular discussion and call out RSA on its own turf to demonstrate how no vendor is immune to what has allegedly happened in terms of the nefarious dealings with the NSA.

There are plenty of questions about what has happened with the NSA, security vendors and other large IT vendors and RSA is the perfect forum for those discussions to take place; at an event where everyone is talking about security.

Given all the discussions raging on about how much people and organizations can trust IT vendors, one thing I will point out, as I pointed out previously, WinMagic (a private, Canadian-based company), has not enabled any backdoors for anyone in our software.

We’ll also be at RSA Conference 2014 – as attendees. If you’d like to connect with us, there will be a number of places you can find us including the TCG Sessions on Monday, Feb. 24th.

Previous Post
Happy New Year from WinMagic
Next Post
Connect with us!

Related Posts

What’s your P@ssw0rd?

I know I’m a little late to the party, but recently I’ve been giving more and more thought to the passwords I use to access the various sites and tools I use on a day to day basis. The main…
Read more

Why Apple Matters in The Enterprise

It’s always interesting to get into the Mac vs. Windows debate as it relates to the Enterprise. For the longest time, the corporate IT stack was predominately Windows-based, but not any more. With the introduction of the iPhone and iPad,…
Read more

620,000 reasons to encrypt

I’ve talked about it before and as an organization we’re constantly trying to tell people and organizations that encryption should be the first line of defense for data on portable devices such as laptops. And yet again, we’re seeing a…
Read more

Hidden Benefits of Encryption for Legal Services

Lately we have noticed a growing interest for encryption and data security in the legal services industry. Legal services face a similar challenge as other verticals with the need to protect corporate assets being shared through multiple devices and portals.…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
 
Contact Us
 

This will close in 0 seconds