Remove 2012 Remove Big data Remove Marketing
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. Image: FBI. Security analysts and U.S. Chengdu404’s offices in China.

Antivirus 364
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

billion in 2021, and growing concerns over data security , software supply chains , and ransomware suggest the market will remain strong through economic ups and downs. As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

Over the last 20+ years, the SIEM market has procured substantial growth within the technology industry. But before we go into where the SIEM market goes from here, let’s first take a look back at how SIEM has evolved. Phase 1: The first SIEMs took in data and served up alerts. Today, SIEM accounts for approximately $4.4

Marketing 116
article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Top Tier Market Players Best of the Rest. The IBM Security QRadar Security Information and Event Management is an enterprise favorite that’s adapted with the evolution of the SIEM market. Market Players. Unified storage of logs capable of big-data searches and visualizing analytics. Try free for 30 days!

Software 113
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. These databases house the crown jewels of many organizations, critical applications and customer data, and thus are a primary target of hackers.

Firewall 118
article thumbnail

Best Enterprise VPN Solutions for 2021

eSecurity Planet

The market jumped, but how does a movement towards zero trust affect the future of VPNs, and what VPN vendors offer genuine enterprise-tier services? Cyberghost is explicit in their marketing, they believe privacy is a fundamental human right, and it drives their solutions. 5 star rating. 5 star rating with 10k+ in the Apple Store.

VPN 57
article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

FLASHBACK The new clues about Rescator’s identity came into focus when I revisited the reporting around an April 2013 story here that identified the author of the OSX Flashback Trojan , an early malware strain that quickly spread to more than 650,000 Mac computers worldwide in 2012. Posting my links in your profiles, on your walls.