Connect with us

Hi, what are you looking for?

HEADLINES

Did you know that the firewall is now a quarter of a century old?

Did you know that one crucial application that protects us from the cyber evil out there is already a quarter of a century old?

Did you know that one crucial application that protects us from the cyber evil out there is already a quarter of a century old?

The first firewall, introduced in 1991, was created to combat computer viruses and Internet worms. Over the years, as attacks and malware have become more sophisticated, the firewall has had to develop and grow with each security breach that has been discovered.

However, it was not until 2003 that the concept of a Next Generation Firewall (NGFW) would be introduced.

The evolution of the firewall has occurred relatively quickly. Here is a quick rundown of the firewall evolution timeline:

1998: An Intrusion Detection System was released
2003: Gartner begins to discuss Next Generation Firewall
2006: Web application firewalls become stronger
2012: An evader tool is launched, as was security-enabled security
2014: The firewall turns 25

Advertisement. Scroll to continue reading.

A mere 10 years after the conceptualization of NGFW, McAfee was already ahead of the competition with their own NGFW development efforts.

“The firewall has had a great evolution, but its development and growth really occurred with each security breach discovered.  These events triggered security developers to react with more and more advanced firewall technology,” said a McAfee blog.

McAfee, part of Intel Security, celebrates the 25th Anniversary of the Firewall with the launch of an infographic showing the last 2.5 decades in review:

history of the firewall infographic_FINAL

 

 

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Organizations must implement a risk assessment methodology that is aligned with their operational realities – by establishing a clear asset baseline, organizations can engage...

APPS

Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in the Philippines...

White Papers

Nearly 50% of companies paid the ransom to get their data back – the second highest rate of ransom payment for ransom demands in...

GAMING

To help players stay safe, Kaspersky is launching “Case 404” — an interactive cybersecurity game that teaches Gen Z how to recognize threats and protect their...

HEADLINES

A zero-trust secure connection has many applications beyond automotive. It’s really for any industry that cares about security, and managing that security at scale.

HEADLINES

Organisations across the Asia-Pacific and Japan region are putting their security posture first, and many are now detecting intrusions early in the attack lifecycle,...

HEADLINES

Agentic AI Assistants—such as Apple Siri, Google Gemini, Microsoft Copilot, OpenAI ChatGPT, and others—are increasingly available to mobile users in consumer and enterprise environments. However, the same...

HEADLINES

Based on breach-tracking research conducted for over two decades, over 124 million Filipino user accounts have been compromised since 2004. This puts the Philippines...

Advertisement