Remove 2001 Remove Firewall Remove Network Remove Security
article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Artificial intelligence (AI) in 2023 feels a bit like déjà vu to me.

Security 342
article thumbnail

What Executives Should Know About Shift-Left Security

CIO

By Zachary Malone, SE Academy Manager at Palo Alto Networks The term “shift left” is a reference to the Software Development Lifecycle (SDLC) that describes the phases of the process developers follow to create an application. How did the term shift-left security originate? The term was first coined by Larry Smith in 2001.

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity 2030

Haft of the Spear

Discussions about cybersecurity overwhelmingly focus on the recent, which are our responses to the design and engineering decisions of the past. Yet in cybersecurity [1] the path towards a brighter future is rarely discussed. To parahprase William Gibson, this cybersecurity future is already here, it is just not evenly distributed.

article thumbnail

A Practical History of the Firewall – Part 2: The Value of Management

Firemon

The Check Point Policy Editor The Check Point Central Object Repository Central Logging Multi-Domain Management and OPSEC Cisco and the CLI were a Dominant Player Book a Demo Jody Brazil CEO at FireMon Check Point and stateful inspection firewalls won the early battle against proxy firewalls ( Part 1: Early Days ).

article thumbnail

Technology Trends for 2024

O'Reilly Media - Ideas

Before that, cloud computing itself took off in roughly 2010 (AWS was founded in 2006); and Agile goes back to 2000 (the Agile Manifesto dates back to 2001, Extreme Programming to 1999). Deep learning, the creation and application of neural networks with many layers, is fundamental to every aspect of modern AI. That’s just a start.

Trends 119
article thumbnail

Cyber Canon Book Review: Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Palo Alto Networks

Cyber Canon Book Review: “Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time,” 2018, by O. Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame. The ease of use of which insecure systems, networks and applications can be built, often under the radar of IT, is a cause for concern. .