Remove 2002 Remove Risk Remove Technology
article thumbnail

Anton’s Alert Fatigue: The Study

Anton on Security

Now, take your time machine to 2002. An easy answer I get from many industry colleagues is that we could have easily solved the problem at 2002 levels of data volumes, environment complexity and threat activity. In theory they should have decreased over the last 25 years, if we believe that security technology is improving.

article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

To help you cut through the noise, weve curated a list of 20 top cybersecurity technology providers that stand out for their innovation, impact, and effectiveness. Tenable Best for vulnerability management Headquarters: Columbia, Maryland Founded: 2002 Annual Revenue: $0.8 Visit Trend Micro 8. Visit Darktrace 11. Visit OneTrust 15.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. You can give a listen to the entire interview at this accompanying podcast.

Risk 182
article thumbnail

Clearview AI commercialization of facial recognition raises concerns, risks

CSO Magazine

The prescience displayed in the 2002 film has actually short-changed the advances of science and technology between then and now. Recently, Clearview AI has announced that it is taking its advanced facial recognition technologies beyond the already controversial government/law enforcement usage into the commercial sector.

Risk 109
article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. While the science is a bit muddy for those who are not quantum theory experts, we can all agree that quantum computing is faster than any other computing technology.

Risk 134
article thumbnail

Should the CISO Report to the CIO?

Cisco Security

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. Viewed another way, having the CISO report to the CIO relegates cybersecurity to an IT security, or technology, function.

CISO 141
article thumbnail

Tracing the Evolution of IT Leadership and Strategy

SecureWorld News

In that time, I've seen the role of technology leadership shift from strategic to operational, and the metrics by which technology impact is measured move from market-oriented to cost-focused. How did this shift happen, and how does it impact modern technology leadership?