Remove 2007 Remove Authentication Remove Identity Theft
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Beyond financial exchange, permissionless blockchains offer strong security through decentralization, and potential use cases include identity verification, voting, and fundraising. Since the 1970s, Public Key Infrastructure (PKI) has offered encryption , authentication, bootstrapping, and digital signatures to secure digital communications.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1998-2007 — Max Butler — Max Butler hacks U.S. In 2007, he is arrested and eventually pleads guilty to wire fraud, stealing millions of credit card numbers and around $86 million of fraudulent purchases. Am I taking an Identity-first approach? government websites in 1998 and is sentenced to 18 months in prison in 2001.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

Founded: 2007. Cybersecurity product categories: Advanced threat protection, managed services , endpoint security , encryption , web gateway , email security, network security, cloud security, antivirus, identity theft protection, website security, mainframe security. Headquarters: San Jose, CA. Annual Revenue: $663 million.

article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

SDP enforces the need-to-know principle by verifying device posture and identity prior to grating access to applications. Specific rules of engagement for IoT Identity: Identify a naming system for IoT devices. Establish an IoT identity lifecycle. Design and deploy an authentication / authorization process.

IoT 109