Remove 2002 Remove Internet Remove Technology
article thumbnail

RSAC Fireside Chat: A breakthrough in securing cloud collaboration — decentralized key storage

The Last Watchdog

Back in 2002, when I was a reporter at USA Today , I had to reach for a keychain fob to retrieve a single-use passcode to connect remotely to the paper’s publishing system. Guest expert: Phani Nagarjuna, CEO, Circle Security According to Nagarjuna, Circle’s technology places a small agent on the endpoint device.

article thumbnail

Why Your VPN May Not Be As Secure As It Claims

Krebs on Security

Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. When a device initially tries to connect to a network, it broadcasts a message to the entire local network stating that it is requesting an Internet address. Image: Shutterstock.

VPN 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Companies today spent vast amounts on incredibly sophisticated defenses, such as next-gen firewalls , EDR , DLP and IDS technologies that generate oceans of threat feeds pouring into artificially intelligent SIEMs , UEBAs and other analytics platforms.

article thumbnail

What does WiFi stand for?

Malwarebytes

We use WiFi to connect to the Internet, but what is it, and what does it stand for? How does it have such a catchy name, and why do we sometimes have a weak Internet connection with a strong WiFi signal and vice versa? technology” doesn’t quite roll off the tongue. What is the difference between WiFi and Internet?

Wireless 134
article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. While the science is a bit muddy for those who are not quantum theory experts, we can all agree that quantum computing is faster than any other computing technology.

Risk 134
article thumbnail

MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’

The Last Watchdog

On January 15, 2002, Bill Gates issued his famous “ Trustworthy Computing ” (TC) company-wide memo, slamming the brakes on Windows Server 2003 development and temporarily redirecting his top engineers to emphasize security as a top priority. The common denominator is trust—critical then and now. I’ll keep watch and keep reporting.

Software 100
article thumbnail

Tracing the Evolution of IT Leadership and Strategy

SecureWorld News

In that time, I've seen the role of technology leadership shift from strategic to operational, and the metrics by which technology impact is measured move from market-oriented to cost-focused. How did this shift happen, and how does it impact modern technology leadership?