CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-hD-i3qFvtPn3ofg2NhDrHA' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:46:05 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 20:36:49 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210029-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759783008.120073,VS0,VE1172
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8536
RIM CS-ISOC
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
RIM CS-ISOC
Team Information | |
---|---|
Team name | RIM CS-ISOC |
Official team name | BlackBerry Information and Product Security |
Country of team | Canada CA |
Other countries of team | United States of America (the) US |
Date of establishment | 2007-11-01 |
Business Hours | |
---|---|
Timezone | GMT-5 |
Description of business hours | 24x7x365 |
Constituency | |
---|---|
Type of Constituency | Other commercial |
Description of Constituency | Research In Motion’s (RIM) Security Operations Centre provides operational computer security and incident response services to both the corporation and the Global Blackberry service network. |
Internet Domain Address | rim.com blackberry.com researchinmotion.com global variants thereof (.net, .org, .es, ...) |
Cryptography | |
---|---|
PGP key id | 0x29E7DD1D5F5F9BC8 |
PGP fingerprint | 77C254588C4ECDED54304AE229E7DD1D5F5F9BC8 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=Miwp
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.