Remove 2001 Remove Authentication Remove Security
article thumbnail

Goodbye, NAC. Hello, software-defined perimeter

Network World

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006. The early 2000s produced a steady progression of internet worms, including Code Red (2001), Nimda (2001), SQL Slammer (2003), Blaster (2003), Bagel (2004), Sasser (2004), Zotob (2005), etc.

Software 150
article thumbnail

The Sony Hack in Context

CTOvision

The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. In connection with these losses the recently retired Director of the National Security Agency has stated, "In fact, in my opinion, it''s the greatest transfer of wealth in history,".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

Identity authentication startup Auth0, which raised a $120 million Series F round in July, added three new board members: • Former Hewlett Packard Enterprise Chief Sales and Marketing Officer Sue Barsamian. The 9-year old company provides security technology and analysts, with a focus on healthcare, financial and government organizations.

Groups 104
article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

W illiam Lidster has been with AAA Washington since August of 2017, serving as the leader of its information security an d compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.

article thumbnail

The silent spreaders: How computer worms can sneak into your system undetected?

Dataconomy

However, in the context of computer security, the term “worm” is used to refer to a self-replicating malware program that spreads through a network, as described in the previous section. CodeRed: A worm that first appeared in 2001 and infected tens of thousands of servers running Microsoft’s IIS web server software.

System 36
article thumbnail

Bringing the Magic of Amazon AI and Alexa to Apps on AWS.

All Things Distributed

The concept has been explored by many popular science fiction movies and TV shows, such as "2001: A Space Odyssey" with HAL-9000 or the Star Trek computer and Commander Data, which defined the perception of computer-generated speech.

article thumbnail

The silent spreaders: How computer worms can sneak into your system undetected?

Dataconomy

However, in the context of computer security, the term “worm” is used to refer to a self-replicating malware program that spreads through a network, as described in the previous section. CodeRed: A worm that first appeared in 2001 and infected tens of thousands of servers running Microsoft’s IIS web server software.

System 28