Remove 2012 Remove Compliance Remove Firewall Remove Security
article thumbnail

What Is cloud security?

Lacework

At this time, establishing server securing meant focusing on physical measures and preventing unauthorized individuals from accessing the hardware. The 1990s also saw the rise of firewalls and antivirus programs, as organizations (and individuals) began storing and sharing more personal information online.

Cloud 98
article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Data Security—What’s New and What’s Next? Chief Security Architect, Office of the CTO, Cloudera. Security Spotlight: Focus on HIPAA and PCI Compliance. Chief Security Architect, Office of the CTO, Cloudera. Security and Compliance in the Era of Big Data. Eddie Garcia. 10:50 – 11:35 AM. Eddie Garcia.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Data Security—What’s New and What’s Next? Chief Security Architect, Office of the CTO, Cloudera. Security Spotlight: Focus on HIPAA and PCI Compliance. Chief Security Architect, Office of the CTO, Cloudera. Security and Compliance in the Era of Big Data. Eddie Garcia. 10:50 – 11:35 AM. Eddie Garcia.

article thumbnail

Bastion Host: What Is It and Do You Really Need It?

Mentormate

The concept of a bastion host first appeared in a 1990 article written by the cybersecurity researcher Marcus J. In that article about firewalls, he defined bastion hosts as “a system identified by the firewall administrator as a critical strong point in the network security. A Bastion-less Security Solution.

Linux 105