article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Cybersecurity, which started with antivirus suites, spam filters and firewalls, has mushroomed into a $103 billion industry. Cybersecurity, which started with antivirus suites, spam filters and firewalls, has mushroomed into a $103 billion industry.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. Thinking back to 2002, SOX just came out, HIPAA was new and cool, while PCI DSS … was not born yet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

A requirement that the Office of Personnel Management (OPM) recognize that the cybersecurity career field requires specialized knowledge, skills, and abilities, and therefore create a new cybersecurity job series, rather than placing cybersecurity specialists under the existing GS-2210 job series (Information Technology Management Series).

CISO 102
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. Thinking back to 2002, SOX just came out, HIPAA was new and cool, while PCI DSS … was not born yet.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Security services and tools include anti-DDoS , SOCaaS , web application firewalls (WAF), data encryption , and more. Also Read: Top Web Application Firewall (WAF) Vendors. Under security enhancements this could be adding cloud asset inventory, data loss prevention (DLP), firewalls , or VPC service controls.

Firewall 100
article thumbnail

What does WiFi stand for?

Malwarebytes

” Some members of the WiFi Alliance, the wireless industry organization that promotes wireless technologies and owns the trademark, may even have encouraged this misconception. technology” doesn’t quite roll off the tongue. technology” doesn’t quite roll off the tongue. How does WiFi work?

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

And these are threats that apply to every technology in various ways, they interact with the things we're putting together. It derives cleanly, from the key thing you trot from the point in the movie, to the point in the technology and if you do that, it comes together nicely. The technologies we use have a light side and a dark side.