article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Department of Justice. “The company is monitoring developments.”

article thumbnail

Best Network Security Tools 2021

eSecurity Planet

With almost every aspect of business becoming more digital, enterprise network security software minimizes the impact of cyberattacks — especially as guarding against them protects a company’s operations and safeguards its competitiveness in a fast-moving marketplace. Top network security tools. XM Cyber Platform.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2017 and Tidal Forces

Adam Shostack

[no description provided] There are two great blog posts at Securosis to kick off the new year: Tidal Forces: The Trends Tearing Apart Security As We Know It (Rich Mogull) Network Security in the Cloud Age: Everything Changes (Mike Rothman) Both are deep and important and worth pondering. You no longer have that luxury.

Firewall 130
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

data: 2003, source ). BTW, this last historical artifact makes me a bit angry, because at least one of the “cool” “search-based ‘SIEM’” vendors cannot do this today, in 2022, while the cheapest and simplest of the 1st generation SIM/SEMs could do it in 2003. (date: 2002, source ). date: 2002, source ).

article thumbnail

OWASP Top 10 Vulnerabilities | Avast

Security Boulevard

Last week was the 20 th anniversary of the Open Web Application Security Project ( OWASP ), and in honor of that date, the organization issued its long-awaited update to its top 10 exploits. It has been in draft form for months and has been updated several times since 2003, and before its latest iteration, in 2017.

article thumbnail

Supply-Chain Security and Trust

Schneier on Security

In both cases, we want to verify that the end product is secure and free of back doors. Sometimes we can do this for some classes of back doors: We can inspect source code ­ this is how a Linux back door was discovered and removed in 2003 ­ or the hardware design, which becomes a cleverness battle between attacker and defender.

article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

Top Cybersecurity Companies Compared Vendor # of eSecurity Planet Top Product Lists Market Capitalization (2025) Overall Gartner Peer Insights Score Overall Glassdoor Score Palo Alto: Best Protection Against Network, Endpoint and Remote Asset Attack 14 $121.40 Fortinet: Best for Network Security Perimeter Protection 15 $74.33