Remove 2005 Remove Digital transformation Remove IoT Remove Ransomware
article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Primary vectors take the form of phishing campaigns, supply chain corruption and ransomware attacks, like the one that recently resulted in the shut down of Colonial Pipeline. What’s happening is that digital transformation, while providing many benefits, has also dramatically expanded the attack surface. “An

Security 127
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. SIEMs failed to live up to their hype in the decade after they were first introduced in 2005.

Security 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper. The earliest SIEMs cropped up around 2005 or so.

Big data 157
article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Mikko had read some of my reporting on Netsky, which Skynet backwards, a virus also known as Sasser, was a typical virus-of-the-day back in 2005. Instead we have these faceless ransomware groups. Hypponen: I think the big shift has been around ransomware groups going after the biggest possible talks. So it pays off.