A tsunami of security data from Internet of Things endpoints could break the will of SOC analysts. What is needed are better tools for analyzing that data, including the use of machine learning. But AI and machine learning aren’t magic bullets. In this opinion piece, RSA Chief Technology Officer Dr. Zulfikar Ramzan presents a 5 point plan for using analytics in the data center.
Podcast: Play in new window | Download (0.0KB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s episode of The Security Ledger Podcast (#99), we bring you an exclusive interview with Eric Lundgren, the celebrated entrepreneur who has helped revolutionize the recycling of electronic waste through his company IT Asset Partners, but who will soon start serving a 13 month jail sentence for copyright infringement for distributing Microsoft Windows “restore CDs.” Together, we wonder if The Internet of Things is leading us into a future in which giant software companies and thing makers use copyright law and the courts to prosecute non-sanctioned use of their technology.
Newly discovered malicious software dubbed VPNFilter has infected hundreds of thousands of routers and network attached storage (NAS) devices globally and could be used to steal sensitive data or wipe out (“brick”) the devices, the company said.
A lot changed in the 4 years between the last two OWASP Top 10 lists. In this end user perspective*, security pro Dino Londis talks about those changes and argues that organizations need to address the most common web application attacks, even as they work to engineer a new generation of secure applications.
In this industry perspective, Thomas Hofmann of Flashpoint says that sensational coverage of advanced persistent threat (APT) actors does little to help small and mid sized firms defend their IT environments from more common threats like cyber criminals. The key to getting cyber defense right is understanding the risks to your firm and prioritizing investments to protect critical IT assets.