Connect with us

Hi, what are you looking for?

HEADLINES

Did you know that the firewall is now a quarter of a century old?

Did you know that one crucial application that protects us from the cyber evil out there is already a quarter of a century old?

Did you know that one crucial application that protects us from the cyber evil out there is already a quarter of a century old?

The first firewall, introduced in 1991, was created to combat computer viruses and Internet worms. Over the years, as attacks and malware have become more sophisticated, the firewall has had to develop and grow with each security breach that has been discovered.

However, it was not until 2003 that the concept of a Next Generation Firewall (NGFW) would be introduced.

The evolution of the firewall has occurred relatively quickly. Here is a quick rundown of the firewall evolution timeline:

Advertisement. Scroll to continue reading.

1998: An Intrusion Detection System was released
2003: Gartner begins to discuss Next Generation Firewall
2006: Web application firewalls become stronger
2012: An evader tool is launched, as was security-enabled security
2014: The firewall turns 25

A mere 10 years after the conceptualization of NGFW, McAfee was already ahead of the competition with their own NGFW development efforts.

“The firewall has had a great evolution, but its development and growth really occurred with each security breach discovered.  These events triggered security developers to react with more and more advanced firewall technology,” said a McAfee blog.

McAfee, part of Intel Security, celebrates the 25th Anniversary of the Firewall with the launch of an infographic showing the last 2.5 decades in review:

history of the firewall infographic_FINAL

 

Advertisement. Scroll to continue reading.

 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

Advertisement