article thumbnail

An Interview With the Target & Home Depot Hacker

Krebs on Security

“My nickname was MikeMike, and I worked with Dmitri Golubov and made technologies for him,” Shefel said. ” Dmitri Golubov, circa 2005. Golubov was arrested in Ukraine in 2005 as part of a joint investigation with multiple U.S. “I’m also godfather of his second son.” Image: U.S. ” Mr.

Retail 258
article thumbnail

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

The Last Watchdog

Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last. Their capacity to ingest threat feeds is becoming more relevant with the rise of IoT (Internet of Things) systems and the vulnerabilities of old and new OT (operational technology).

IoT 179
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Israel’s Naftali Bennett Becomes The First Head of Government To Emerge From The CyberSecurity Industry

Joseph Steinberg

Bennett spent several years as the New York-based CEO of the firm, before he and his partners sold Cyota to RSA Security in 2005 for $145 Million. Bennett, who is also the first Prime Minister to emerge from Israel’s high-tech industry, co-founded what would eventually become the cybersecurity firm, Cyota , in 1999.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies.

Risk 164
article thumbnail

New streaming ad technology plays hide-and-seek with gamers

Malwarebytes

Let’s take a look at how advertising has been used in an Amazon gaming title previously, and see how that could create a frosty reception for any new ad technology. Way back in 2005, dynamic ads were introduced to titles like The Matrix Online. How does this work? The sliding doors of advertising banners.

article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

ABE has undergone significant theoretical advancements since 2005. NTT is partnering with the University of Technology Sydney to introduce an ABE service that fits with existing IT infrastructure, including cloud computing, healthcare, IoT and secure data sharing.

article thumbnail

The CSO role today: Responsibilities and requirements for the top security job

CSO Magazine

and one that our founding editor Derek Slater offered up to readers way back in 2005—heck, if there's one website you ought to be able to trust to tell you what a CSO is, it's CSOonline. A CSO is a departmental leader responsible for information security, corporate security or both. At many companies, the term CSO is still used in this way.

CSO 116