article thumbnail

A Practical History of the Firewall – Part 4: The Next Generation

Firemon

The Next-Generation Firewall Market Penetration of the Next-Gen Firewall The Platform The Future of the Firewall Book a Demo Jody Brazil CEO at FireMon As hardware and software performance improved, the difference in firewall performance between the different vendors became much smaller. A very impressive track record.

article thumbnail

What Is cloud security?

Lacework

The 1990s also saw the rise of firewalls and antivirus programs, as organizations (and individuals) began storing and sharing more personal information online. The 2000s and 2010s saw several major releases in the field of cloud computing. The 2000s and 2010s saw several major releases in the field of cloud computing.

Cloud 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Ten Web Hacking Techniques of 2010 (Official)

Jeremiah Grossman

2010 produced 69 new attack techniques! Today the polls are close, votes are in, and the official Top Ten Web Hacking Techniques of 2010 has been finalized! Top Ten Web Hacking Techniques of 2010! In fact, only two entries did not gain any points. To make it on to the top ten though, is well, another matter entirely.

article thumbnail

Calling all security researchers! Submit your new 2010 Web Hacking Techniques

Jeremiah Grossman

The selection process for 2010 will be a little different. From the voting results the most popular 15 entries will be those judged by our panel of experts on the basis of novelty, impact, and overall pervasiveness to decide the Top Ten Web Hacking Techniques of 2010. Right now I’m working on a really cool set of prizes for #1.

article thumbnail

Cybersecurity Snapshot: If Recession Hits, Infosec Teams Expected to Suffer the Fewest Job Losses

Tenable

Government Accountability Office (GAO) just issued a report titled “ Challenges in Protecting Cyber Critical Infrastructure ” in which it states that federal agencies haven’t implemented almost 57% of the recommendations it has made since 2010 for protecting their cyber critical infrastructure. Department of Energy, the U.S.

article thumbnail

Stay away from the Headlines! Cyber Security imperatives for the new normal

Trigent

Created by John Kindervag back in 2010 based on “never trust, always verify”. Technologies such as Identify and Access Management (IAM) and multi-factor authentication (MFA) are complementary to this approach. Routine audits on identity permissions, firewalls and cloud resources can help prevent these breaches.

article thumbnail

Modernizing Critical Infrastructure Requires Security Transformation

Palo Alto Networks

Perhaps they may also consider any user who has successfully authenticated themselves for access into OT to be trusted at that point. This trust model has proven to be flawed and we can go back as far as the Stuxnet attack of 2010 when a truly air-gapped system was breached through a compromised vendor.