Overclock.net › Forums › Industry News › Technology and Science News › [Wired] Second Defense Contractor L-3 ‘Actively Targeted’ With RSA SecurID Hacks
New Posts  All Forums:Forum Nav:

[Wired] Second Defense Contractor L-3 ‘Actively Targeted’ With RSA SecurID Hacks - Page 2

post #11 of 12
Quote:
Originally Posted by _GTech View Post
I'm a little put off that they haven't caught any of these hackers yet...

Seems to me the Corporations have horrible security, to put it lightly...

Obviously you get what you pay for though huh?

If you pay a security firm, which pays their employees low wages, you will end up with low paid worker results, which are usually poor...

Same thing goes with temp services, you get what you pay for...

When these corporations learn the hard way that the people will fight you back if you screw them over, maybe we will have change once again...

Maybe...

Or the fail boats will continue sink I suppose...
Gtech

Defense contractors take Information Security seriously and pay very well for the appropriate skill set. Now the cost of a low level analyst conducting scans and reviewing IDS alerts is more than the average salary of a typical US worker but significantly lower than for an individual with the appropriate security analysis and operational experience background. This includes some aspects of intelligent gathering and disinformation.

The answers to the following questions may be enlightening:
What is the turnover of Secret Service agents with computer security experience? You may be surprised at what they are receiving from private companies.
What is the security rate for seasoned computer security professionals working as consultants? Not analysts that just run scan reports.
Research the growth in defense spending and see which area is most in demand and highest paying. Also, note these positions cannot be relocated offshore.
The skills involved in the above positions deal with vulnerability analysis, application vulnerabilities, risk assessment and mitigation along with other activities. (This is not vulnerability scanning) This includes understanding how applications/infrastructure is compromised and mitigating those risks. Some of mitigation steps are not just technical in nature.
Gunslinger
(13 items)
 
  
CPUMotherboardGraphicsRAM
1090 MSI 890FXA GD70 5870 Corsair 
Hard DriveOSMonitorPower
C300 Windows I-INC Thermaltake 850 
Case
HAF 932 
  hide details  
Reply
Gunslinger
(13 items)
 
  
CPUMotherboardGraphicsRAM
1090 MSI 890FXA GD70 5870 Corsair 
Hard DriveOSMonitorPower
C300 Windows I-INC Thermaltake 850 
Case
HAF 932 
  hide details  
Reply
post #12 of 12
Quote:
Originally Posted by bad_haze View Post
L-3 . . . front company . . .


Now that the company that sold security apparatus to government agencies and defense contractors has been hacked, they'll have plausible deniability when they exploit the back doors built into that apparatus to collect secrets that can be leveraged for control. The blame for those security breaches will be pinned on whichever Lulzsec expy is causing the most irritation and the response will be an expansion of government spying, leading to the collection of additional secrets that can be leveraged for control.
Edited by willis888 - 6/6/11 at 2:10pm
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Technology and Science News
Overclock.net › Forums › Industry News › Technology and Science News › [Wired] Second Defense Contractor L-3 ‘Actively Targeted’ With RSA SecurID Hacks