Remove 2009 Remove Architecture Remove Internet Remove Technology
article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Brinqa was founded in 2009 by Amad Fida and Hilda Perez, industry veterans seeking to leverage their collective expertise in risk management and identity and access management. But that assignment led Fida and Perez to re-architecture the platform around graph databases and knowledge graphs. So what is Brinqa bringing to the table?

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. John Bruggeman is chief technology officer at Hebrew Union College – Jewish Institute of Religion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISSPs from Around the Globe: An Interview with James Wright

CyberSecurity Insiders

Air Force veteran and graduate of the University of Denver holding a Master of Science degree in Information Systems Security and a Bachelor of Arts degree in Information Technology. I also work with my team on leading risk assessments, authoring position papers, security architecture evaluations, and associated risk discovery activities.

article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

At the same time, WAF technology is increasingly a part of more comprehensive security solutions like next-generation firewalls (NGFW), unified threat management (UTM), and more. From the 1998 MIT Entrepreneurship Competition to today, Akamai Technologies is now a top provider of WAF solutions. Microsoft Azure. Signal Sciences.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

So while you may be particularly skilled in security architecture and engineering. She's carrying a computer around with her all the time, it's likely attached to the internet, many times a day. Right, low technology you need an internet computer or Chromebook that works beautifully on a Chromebook.

Hacking 52
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Started in 1987, the telecommunications provider has become a multinational technology whale. At just $42M, Huawei added HexaTier’s patented technology offering cloud-based databases (DBaaS) security via a reverse proxy on endpoints. IBM comes with a presence in 170 countries and is the second oldest vendor on our list. billion.

Firewall 118
article thumbnail

Easily Exploitable Linux Flaw Exposes All Distributions: Qualys

eSecurity Planet

The vulnerability, tracked as CVE-2021-4034 , has “been hiding in plain sight” for more than 12 years and infects all versions of polkit’s pkexec since it was first developed in 2009, Bharat Jogi, director of vulnerability and threat research at Qualys, wrote in a blog post. through 2.14.1. Log4Shell is tracked as CVE-2021-44228.