Tag: software

Report: Cybercriminals target difficult-to-secure ERP systems with new attacks

Cybercriminals are targeting enterprise resource planning (ERP) apps–some of the oldest and most difficult-to-secure business software systems–with new attacks in an effort to exploit vulnerabilities and gain access to valuable, sensitive enterprise data, according to a new report.

Opinion: With Internet of Things, Devices become Insider Threat

Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective. 

IoT, Machine Learning and AI in the Security Operations Center

A tsunami of security data from Internet of Things endpoints could break the will of SOC analysts. What is needed are better tools for analyzing that data, including the use of machine learning. But AI and machine learning aren’t magic bullets. In this opinion piece, RSA Chief Technology Officer Dr. Zulfikar Ramzan presents a 5 point plan for using analytics in the data center.  

Episode 99: Are we criminalizing reuse? An Exclusive Interview with Eric Lundgren

In this week’s episode of The Security Ledger Podcast (#99), we bring you an exclusive interview with Eric Lundgren, the celebrated entrepreneur who has helped revolutionize the recycling of electronic waste through his company IT Asset Partners, but who will soon start serving a 13 month jail sentence for copyright infringement for distributing Microsoft Windows “restore CDs.” Together, we wonder if The Internet of Things is leading us into a future in which giant software companies and thing makers use copyright law and the courts to prosecute non-sanctioned use of their technology. 

Everybody reboot! VPNFilter Malware infects 500k Routers

Newly discovered malicious software dubbed VPNFilter has infected hundreds of thousands of routers and network attached storage (NAS) devices globally and could be used to steal sensitive data or wipe out (“brick”) the devices, the company said.