Remove 2009 Remove Data collection Remove Technology
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

One of the most notorious and painful problems that has amazing staying power is of course that of data collection. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. Back in 2009, SaaS SIEM didn’t really exist…but that is the story for another day.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

One of the most notorious and painful problems that has amazing staying power is of course that of data collection. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. Back in 2009, SaaS SIEM didn’t really exist…but that is the story for another day.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Founded in 2009, a16z already has an extensive track record of success, investing in over 500 companies and producing 160 exits. As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Evolution Equity Partners. EEP Investments.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. It turns out there is a natural opening for this technology: microlegislation. Political scientist Amy McKay coined the term.

article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

within network activity logs collected by the Internet Service Provider (ISP), etc.). Below are some examples of the type of data collected and strategies of collection and analysis during the technical attribution process. On the other hand, new capabilities are offered to defenders in response.