Remove 2006 Remove Network Security Remove Technology
article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Department of Justice. “The company is monitoring developments.”

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

BTW, lots of names for this technology space were in use back then, ultimately SIM/SEM won and then was forever fused together by Gartner. The point I’m making with these fond memories is that a lot of the problems we struggled with in our security operations are the same problems we struggle with today. date: 2002, source ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Also read : Addressing Remote Desktop Attacks and Security. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black.

article thumbnail

News alert: DigiCert acquires Vercara to enhance cloud-based DNS management, DDoS protection

The Last Watchdog

We believe the combination of Vercara’s talent and suite of products with DigiCert’s technology and platform, history of innovation, and scale will help ensure customers get the highest level of digital trust available.” About Clearlake: Founded in 2006, Clearlake Capital Group, L.P. For more information, visit www.vercara.com.

DNS 100
article thumbnail

UChecker tool from CloudLinux scans Linux servers

SC Magazine

Oracle Co-Founder Larry Ellison delivers a keynote address at the Oracle OpenWorld conference in 2006. Security teams running Linux servers now have access to UChecker , a new tool from CloudLinux that runs scans on Linux servers to detect outdated shared libraries on both disk and in memory. Justin Sullivan/Getty Images).

article thumbnail

Cloud Bucket Vulnerability Management in 2021

eSecurity Planet

This increasing investment and reliance on cloud technology means that targeting misconfiguration for users isn’t going away. Through a shared responsibility model, cloud providers are only responsible for the security of their cloud infrastructure—everything you put into the cloud is your responsibility. Amazon Web Services (AWS).

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

This specialized form of testing has emerged as a crucial tool for evaluating the security of wireless networks and assessing their resilience against potential cyber-attacks (Davis & Brown, 2020). It underscores the vital role it plays in fortifying the burgeoning landscape of wireless technologies.