Remove 2006 Remove Data collection Remove Technology
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

One of the most notorious and painful problems that has amazing staying power is of course that of data collection. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. If you are curious, what did people care about those days? script kiddies as they were known back then.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

One of the most notorious and painful problems that has amazing staying power is of course that of data collection. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. If you are curious, what did people care about those days? date: 2002, source ). date: 2002, source ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

Promising Jobs at the U.S. Postal Service, ‘US Job Services’ Leaks Customer Data

Krebs on Security

The leaked records indicate the network’s chief technology officer in Pakistan has been hacked for the past year, and that the entire operation was created by the principals of a Tennessee-based telemarketing firm that has promoted USPS employment websites since 2016. “I loved Russ deeply and he was like family.

Marketing 288
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

If you've registered for online banking over telephone banking, then they're using Voiceprint technology to pre-authenticate you when you call into the system. There's a bunch of different technologies there. You know you've got banks right now we're really big on Voiceprint. We've seen that implemented in some phones.

Hacking 52