article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. One of the most notorious and painful problems that has amazing staying power is of course that of data collection. 20 years of SIEM? With this post, I wanted to briefly reflect on this ominous anniversary.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. One of the most notorious and painful problems that has amazing staying power is of course that of data collection. date: 2002, source ). date: 2002, source ). date: 2002, source ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NationalPublicData.com Hack Exposes a Nation’s Data

Krebs on Security

1, 2002 (with very few exceptions). Americans currently have very few rights to opt out of the personal and financial surveillance, data collection and sale that is pervasive in today’s tech-based economy. The breach at National Public Data may not be the worst data breach ever.

Hacking 352
article thumbnail

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The name “Silent Night” Zbot is likely a reference to a weapon mentioned in the 2002 movie xXx, it was first spotted in November 2019 when a seller named “Axe” started offering it on the Russian underground forum forum.exploit[.]in. The malware is able to infect all operating systems.

Banking 145
article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. This data is combined with other surveillance data the company buys, including health and financial data. Collecting and saving less of this data would be a strong indicator of a new direction for the company.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Enacted in 2002 and updated by the Federal Information Security Modernization Act (FISMA) of 2014, FISMA requires agencies to implement a risk-based approach to security. The CCPA requires businesses to provide transparency about data collection practices and allows consumers to opt out of selling their personal information.

article thumbnail

The Key Components of HRIPA Compliance

Centraleyes

Data breaches and privacy concerns are all too common today. That’s why the Australian Health Records and Information Privacy Act 2002 (HRIPA) is highly relevant. HRIPA mandates strict protocols for healthcare providers , requiring them to handle your health data with the utmost care, from secure storage to controlled access.