Blog

Always a treat to get responses from blog posts from the person or product you talk about


Tags :


So yes, this is one of those times.  I blogged back here on Jul 30th about a new magazine I received.  You can read the post to get what I said, but the author of the article, Melisa, sent a great follow-up email.  She even found my posting through Google which is cool (and I saw the search for her name in my Google history but didn't put two and two together).  I did toss the magazine but went to the webpage for the site to read the article one more time around the points she made in her response.  She pointed out she had some other articles in there also which I know I read but didn't comment on.  They didn't catch my eye like this one did dealing with IM all the time.  I trimmed down some of her response to get her points in one blurb (editor rights huh?)

Actually, their strength lies in their secure file transfer, which is very valuable for folks like me that work in computer forensics. ...just to let you know, if you lost the USB fob, it'd take a mad scientist to be able to crack all three of the authentication pieces needed to make it work.

While I believe her statement about the local security on the FOB, I have no reason or way to doubt it, the loss of that data seems to be the main issue.  One other focus was that all this IS logged on a local FOB and not server-side.  Tracing what files are passed to whom and when seems quite important.  Now I don't know if this product also logs on the server or strictly on the FOB device.  If  it does not log on the server, it sounds like they found a loophole in the NASD and SEC rule on how logging needs to be done.  Back to the loss of the FOB.

Well she sent a nice note and I appreciate that, I will read her other articles on phishing and Cloudmark.