article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Since 2004, there's been an annual event designed to "Promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world." 2004 was a key year for several safety activities, encompassing both Safer Internet Day and the Safer Internet Forum. Help required.

article thumbnail

Insider threats: If it can happen to the FBI, it can happen to you

Malwarebytes

A federal grand jury has just charged a former intelligence analyst with stealing confidential files from 2004 to 2017. There’s lots of ways this kind of data collection and retention could go wrong. That’s an incredible 13 years of “What are you doing with that pile of classified material?”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

One of the most notorious and painful problems that has amazing staying power is of course that of data collection. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

One of the most notorious and painful problems that has amazing staying power is of course that of data collection. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor.

article thumbnail

DCAP Systems: Protecting Your Data with Advanced Technology

SecureWorld News

Gartner introduced the term DCAP, but it actually evolved from the concept of DAG systems, which originated in 2004. DCAP incorporates the Data Access Governance ( DAG ) approach, aimed at controlling and managing access to unstructured data, along with additional tools for classifying the data and analyzing user actions.

article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

For larger organizations, the PRTG Enterprise Monitor can monitor thousands of devices for a distributed environment offering auditable data collection and service-based SLA monitoring through the ITOps Board.

Marketing 110
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Shasta Ventures specializes in early-stage investments with a robust portfolio covering consumers, hardware, computer vision, data intelligence, infrastructure, and SaaS. Started in 2004, Shasta offers its Elevate program to help founders navigate growth with proven go-to-market methodologies. Redpoint Ventures.