Remove 2006 Remove Technology Remove Threat Detection
article thumbnail

Detection as Code? No, Detection as COOKING!

Anton on Security

One happened to me a few days ago and led to a somewhat heated debate on the nature of modern threat detection. It also resulted in this half-shallow / half-profound blog that relates detection to cooking and farming! In essence, they want “detection consumption”, not detection engineering. This 2006 (!)

article thumbnail

Detection as Code? No, Detection as COOKING!

Security Boulevard

One happened to me a few days ago and led to a somewhat heated debate on the nature of modern threat detection. It also resulted in this half-shallow / half-profound blog that relates detection to cooking and farming! In essence, they want “detection consumption”, not detection engineering. This 2006 (!)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

AT&T Business Summit is virtual Oct. 27-28 and free!

CyberSecurity Insiders

Given how critical security is to digital transformation and our ability to innovate, we’ve got a robust line-up of cybersecurity topics – from SASE to zero trust and the technologies you need to help protect your business. We hope that you join us as we take this journey together. Join us from October 27-28, 2021 by registering.

article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Anton on Security

As I was looking at the security vendors and their technologies, I realized that security vendors that apparently peaked in relevance, say, in the mid-2000s had huge booths and did brisk business, selling whatever they sold before. RSA 2013 and Endpoint Agent Re-Emergence RSA 2006–2015 In Anton’s Blog Posts! XDR’s older brothers?—?EDR

Marketing 189
article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Security Boulevard

As I was looking at the security vendors and their technologies, I realized that security vendors that apparently peaked in relevance, say, in the mid-2000s had huge booths and did brisk business, selling whatever they sold before. RSA 2006–2015 In Anton’s Blog Posts! So, what was the theme that came to me as I was wandering the halls?

Marketing 116
article thumbnail

CSPM vs CWPP vs CIEM vs CNAPP: What’s the Difference?

eSecurity Planet

We’ll examine each of those cloud security technologies — along with CASB too — and their uses, and direct you to some of the top cloud security solutions. Amazon did the same thing for cloud infrastructure (IaaS) with the launch of AWS in 2006, and platform as a service (PaaS) offerings began to appear around the same time.