article thumbnail

Anton’s Alert Fatigue: The Study

Anton on Security

Now, take your time machine to 2002. An easy answer I get from many industry colleagues is that we could have easily solved the problem at 2002 levels of data volumes, environment complexity and threat activity. Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Nah, didn’t do it.

article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

Tenable Best for vulnerability management Headquarters: Columbia, Maryland Founded: 2002 Annual Revenue: $0.8 The company provides solutions to quantify and assess the risks associated with data exposure and earns places on our risk management , third-party risk management , and hot cybersecurity startups lists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Determining FedRAMP Risk Impact Levels and Data Security Categories

Security Boulevard

The Federal Information Security Modernization Act of 2002 (FISMA) requires all federal agencies and their contractors to implement. The post Determining FedRAMP Risk Impact Levels and Data Security Categories appeared first on Hyperproof.

Risk 98
article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. You can give a listen to the entire interview at this accompanying podcast.

Risk 182
article thumbnail

Better Late than Never? U.S. Bolsters Cybersecurity Ahead of Elections

Adam Levin

The grants came in the form of a special allocation from the Help America Vote Act (HAVA) of 2002.

article thumbnail

Clearview AI commercialization of facial recognition raises concerns, risks

CSO Magazine

The prescience displayed in the 2002 film has actually short-changed the advances of science and technology between then and now. The virtual salesperson greets him by name, “Hello Mr. Yakomoto. Welcome back to the Gap,” from the life-size video monitor. This famous scene is cribbed from the film Minority Report.

Risk 109
article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

What are the security risks? The most significant impending security risks associated with switching over to quantum computers are related to cryptographic encryption. To put this in perspective, it took a group of 300,000 people and four years of work to crack a 64-bit key in 2002.

Risk 134