Always a treat to get responses from blog posts from the person or product you talk about
Tags :Book Reviews
So yes, this is one of those times. I
blogged back here on Jul 30th about a new magazine I received. You
can read
the post to get what I said,
but the author of the article, Melisa, sent a great follow-up email. She
even found my posting through Google which is cool (and I saw the search
for her name in my Google history but didn't put two and two together).
I did toss the magazine but went to the webpage
for the site to read the article one more time around the points she made
in her response. She pointed out she had some other articles in there
also which I know I read but didn't comment on. They didn't catch
my eye like this one did dealing with IM all the time. I trimmed
down some of her response to get her points in one blurb (editor rights
huh?)
Actually, their strength lies in their secure file
transfer, which is very valuable for folks like me that work in computer
forensics. ...just to let you know, if you lost the USB fob, it'd take
a mad scientist to be able to crack all three of the authentication pieces
needed to make it work.
While I believe her statement about the local security on the FOB, I have
no reason or way to doubt it, the loss of that data seems to be the main
issue. One other focus was that all this IS logged on a local FOB
and not server-side. Tracing what files are passed to whom and when
seems quite important. Now I don't know if this product also logs
on the server or strictly on the FOB device. If it does not
log on the server, it sounds like they found a loophole in the NASD and
SEC rule on how logging needs to be done. Back to the loss of the
FOB.
Well she sent a nice note and I appreciate that, I will read her other
articles on phishing and Cloudmark.
blog comments powered by Disqus
On Thursday, August 12th, 2004 by Chris Miller