article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

What’s more, it will likely take a blend of legacy security technologies – in advanced iterations – combined with a new class of smart security tools to cut through the complexities of defending contemporary business networks. That said, a couple of prominent legacy technologies seem sure to endure as security cornerstones, moving forward.

Firewall 224
article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Since 2004, there's been an annual event designed to "Promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world." The Windows Firewall enabled by default, and the Internet Explorer popup blocker. Today is the 20th Safer Internet Day.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is The Cost Of Predictive Cyber Security Worth The Investment?

Security Boulevard

The Livingston firewall rapidly became replaced with Checkpoint running on Windows NT server, (Stop laughing, I actually set one up once). Cisco came to market with the PIX firewall, Netscreen came to market with the ASIC based firewall, and suddenly, security had a voice. This was in 2005! Becoming A Predictable Science?

article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Anton on Security

As I was looking at the security vendors and their technologies, I realized that security vendors that apparently peaked in relevance, say, in the mid-2000s had huge booths and did brisk business, selling whatever they sold before. There are people moving to “next-gen” firewalls (a great innovation of 2005) in 2022.

VPN 189
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. The earliest SIEMs cropped up around 2005 or so. These technologies can recognize when a user is doing something unusual, isolate the problem and then remediate it.

Big data 158
article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. The original function of a SOC was to equip security analysts with everything they needed to detect and respond to any potentially malicious traffic detected inside a company’s firewall.

article thumbnail

Capital One data breach: hacker accessed details of 106M customers before its arrest

Security Affairs

“A former Seattle technology company software engineer was arrested today on a criminal complaint charging computer fraud and abuse for an intrusion on the stored data of Capital One Financial Corporation, announced U.S. .” Thompson (33) is suspected to be responsible for the data breach.