Remove 2003 Remove Risk Remove Threat Detection Remove VPN
article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

However, in many regards, even a SaaS threat detection and response tool requires dedicated personnel such as for tuning and optimization as well as use case design and refinement. A: Historically speaking, I first encountered (well, helped build, really) an SIEM tool that can consume vulnerability data back in 2003.

article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

We left the COVID-19 crisis behind hoping for a long-awaited return to normality and were immediately plunged into the chaos and uncertainty of a twentieth-century-style military conflict that posed serious risks of spreading over the continent. However, the plan was not approved because the government feared collateral damage.

DDOS 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

Our products enable them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior. Cybersecurity product categories: AI, threat detection, incident response, IDPS. Founded: 2003.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. BVP Investments.