article thumbnail

Why Your Security Data Lake Project Will … Well, Actually …

Anton on Security

Note that this blog was informed by my observations of the previous wave of security data lakes ( dating back to 2012 ) and related attempts by organizations to build security data science capabilities. So, in 2012, we said : “Finally, “collect once?—?analyze However, we are not living in 2012 or 2018 anymore?—?we

Big data 202
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. Image: FBI. Security analysts and U.S. Security analysts and U.S. Image: DOJ.

Antivirus 359
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Your Security Data Lake Project Will … Well, Actually …

Security Boulevard

Note that this blog was informed by my observations of the previous wave of security data lakes ( dating back to 2012 ) and related attempts by organizations to build security data science capabilities. So, in 2012, we said : “Finally, “collect once?—?analyze However, we are not living in 2012 or 2018 anymore?—?we

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. a16z Investments. Bessemer Venture Partners. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

Over the last 20+ years, the SIEM market has procured substantial growth within the technology industry. This is easy to understand as SIEM has evolved into the data store for cybersecurity data which has been exploding as the volume of data and number of alerts is growing exponentially. billion globally by 2027.

Marketing 116
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Started in 1987, the telecommunications provider has become a multinational technology whale. At just $42M, Huawei added HexaTier’s patented technology offering cloud-based databases (DBaaS) security via a reverse proxy on endpoints. In 2017, Thales extended its data security posture with the acquisition of Gemalto SafeNet for $5.6

Firewall 117
article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Security Information and Event Management (SIEM) is a crucial enterprise technology that ties the stack of cybersecurity systems together to assess threats and manage risks. Unified storage of logs capable of big-data searches and visualizing analytics. Best SIEM Tools & Software. Micro Focus ArcSight ESM Features.

Software 111