article thumbnail

Anton’s Alert Fatigue: The Study

Anton on Security

Now, take your time machine to 2002. An easy answer I get from many industry colleagues is that we could have easily solved the problem at 2002 levels of data volumes, environment complexity and threat activity. Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Nah, didn’t do it.

article thumbnail

Mapping Mayhem: Security’s Blind Spots in Identity Security

Security Boulevard

For years, primarily driven by regulatory compliance mandates, such as the Sarbanes-Oxley Act of 2002, identity and access management has been treated as a regulatory compliance exercise, rather than the security exercise it should be — and simply checking off compliance requirements leaves many organizations with a dangerous and false sense of security. (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why do we call them trust boundaries?

Adam Shostack

Some digging into the history on my bookshelf: Howard and LeBlancs Writing Secure Code (2002) doesnt mention trust boundaries, and the sample threat models shown dont include any. Trust also calls back to the concept of a trusted computing base, the set of system functionality on which everything else depends. (We

article thumbnail

A sophisticated cyberattack hit the International Criminal Court

Security Affairs

It was established by the Rome Statute, which entered into force on July 1, 2002. The ICC is headquartered in The Hague, Netherlands. In September, the ICC announced that threat actors have breached its systems last week.

article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

Tenable Best for vulnerability management Headquarters: Columbia, Maryland Founded: 2002 Annual Revenue: $0.8 Proofpoint Best for end user data security Headquarters: Sunnyvale, California Founded: 2002 Annual Revenue: $1.1 billion in revenue, Trend Micro continues growing steadily past its first-gen antivirus vendor status.

article thumbnail

Honda, Acura cars hit by Y2K22 bug that rolls back clocks to 2002

Bleeping Computer

Honda and Acura cars have been hit with a Year 2022 bug, aka Y2K22, that resets the navigation system's clock to January 1st, 2002, with no way to change it. [.].

article thumbnail

New Attack on VPNs

Schneier on Security

They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then. […] The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network.

VPN