Tag: software

Data from IoT endpoints risks overloading security analysts. Machine learning and artificial intelligence can help, but more changes are needed.

IoT, Machine Learning and AI in the Security Operations Center

A tsunami of security data from Internet of Things endpoints could break the will of SOC analysts. What is needed are better tools for analyzing that data, including the use of machine learning. But AI and machine learning aren’t magic bullets. In this opinion piece, RSA Chief Technology Officer Dr. Zulfikar Ramzan presents a 5 point plan for using analytics in the data center.  

Eric Lundgren with recycled circuit boards. He will serve 13 months in prison for  selling Windows restore discs along with refurbished PCs and laptops.

Episode 99: Are we criminalizing reuse? An Exclusive Interview with Eric Lundgren

Podcast: Play in new window | Download (0.0KB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s episode of The Security Ledger Podcast (#99), we bring you an exclusive interview with Eric Lundgren, the celebrated entrepreneur who has helped revolutionize the recycling of electronic waste through his company IT Asset Partners, but who will soon start serving a 13 month jail sentence for copyright infringement for distributing Microsoft Windows “restore CDs.” Together, we wonder if The Internet of Things is leading us into a future in which giant software companies and thing makers use copyright law and the courts to prosecute non-sanctioned use of their technology. 

Focusing on advanced persistent threats can blind organizations to more likely and equally dangerous adversaries, according to Thomas Hofmann of Flashpoint.

Opinion: Don’t Be Blinded by APTs

In this industry perspective, Thomas Hofmann of Flashpoint says that sensational coverage of advanced persistent threat (APT) actors does little to help small and mid sized firms defend their IT environments from more common threats like cyber criminals. The key to getting cyber defense right is understanding the risks to your firm and prioritizing investments to protect critical IT assets.