Remove 2002 Remove Data collection Remove Technology
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. One of the most notorious and painful problems that has amazing staying power is of course that of data collection. 20 years of SIEM? With this post, I wanted to briefly reflect on this ominous anniversary.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. One of the most notorious and painful problems that has amazing staying power is of course that of data collection. date: 2002, source ). date: 2002, source ). date: 2002, source ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Enacted in 2002 and updated by the Federal Information Security Modernization Act (FISMA) of 2014, FISMA requires agencies to implement a risk-based approach to security. HIPAA also requires organizations to conduct regular risk assessments and report data breaches.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. AllegisCyber Capital. Evolution Equity Partners. EEP Investments.

article thumbnail

The Key Components of HRIPA Compliance

Centraleyes

Data breaches and privacy concerns are all too common today. That’s why the Australian Health Records and Information Privacy Act 2002 (HRIPA) is highly relevant. HRIPA mandates strict protocols for healthcare providers , requiring them to handle your health data with the utmost care, from secure storage to controlled access.