News & Commentary
Latest Content tagged with Analytics
Page 1 / 2   >   >>
What CISOs Need to Know about the Psychology behind Security Analysis
Commentary  |  8/14/2017  | 
Bandwidth, boredom and cognitive bias are three weak spots that prevent analysts from identifying threats. Here's how to compensate.
Using AI to Break Detection Models
News  |  7/25/2017  | 
Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
How Bad Data Alters Machine Learning Results
News  |  6/13/2017  | 
Machine learning models tested on single sources of data can prove inaccurate when presented with new sources of information.
How to Succeed at Incident Response Metrics
Commentary  |  6/2/2017  | 
Establishing a baseline of what information you need is an essential first step.
How to Integrate Threat Intel & DevOps
Commentary  |  5/4/2017  | 
Automating intelligence can help your organization in myriad ways.
Call Center Fraud Spiked 113% in 2016
News  |  4/26/2017  | 
Criminals are increasingly spoofing caller ID using VoIP apps including Skype or Google Voice to hide their identity and location, according to a report released today by Pindrop Labs.
Machine Learning in Security: 4 Factors to Consider
News  |  4/21/2017  | 
Key factors to consider before adding machine learning to your security strategy.
10 Questions To Get Practical Answers At Interop ITX
Commentary  |  4/14/2017  | 
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Teaching Hospitals at Greater Data Breach Risk
Quick Hits  |  4/6/2017  | 
John Hopkins researcher studies data breaches at hospitals between 2009 and 2016.
Data Visualization: Keeping an Eye on Security
Commentary  |  3/27/2017  | 
Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data. So why does it end up as an afterthought?
Fortune 1000 Companies See Security Ratings Drop
News  |  3/8/2017  | 
Fortune 1000 businesses report more breaches, and lower security performance, than their non-F1000 counterparts.
Trust, Cloud & the Quest for a Glass Wall around Security
Commentary  |  3/8/2017  | 
In the next year, were going to see a leap towards strategic, business-level objectives that can be resolved by simplifying infrastructure and granting greater visibility in real time.
Today on Dark Reading: Your Costs, Risks & Metrics Questions Answered
Commentary  |  2/27/2017  | 
First up on the Dark Reading upcoming events calendar is our Dark Reading Virtual Event Tuesday, Feb. 28.
20 Cybersecurity Startups To Watch In 2017
Slideshows  |  2/24/2017  | 
VC money flowed plentifully into the security market last year, fueling a new crop of innovative companies.
Why Identity Has Become A Top Concern For CSOs
Commentary  |  2/14/2017  | 
Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the fight against cyber adversaries.
IBM Brings Watson Cognitive Computing To The SOC
News  |  2/13/2017  | 
Technology known for a Jeopardy stunt six years ago is now powering question answering within IBM Security's QRadar system.
How to Handle Threats When Short-Staffed
How to Handle Threats When Short-Staffed
Dark Reading Videos  |  2/3/2017  | 
Skyboxs Michelle Cobb, VP of Worldwide Marketing, explains how automation and advanced analytics can give security teams the data they need when their teams are stretched
Over 4.2 Billion Records Exposed In 4,149 Breaches In 2016
Quick Hits  |  1/31/2017  | 
Survey says US and UK witnessed more than half of 2016 global breaches; 52% of attacks compromised Social Security Numbers.
Why Youre Doing Cybersecurity Risk Measurement Wrong
Commentary  |  1/30/2017  | 
Measuring risk isnt as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are five.
This Week On Dark Reading: Event Calendar
Commentary  |  1/25/2017  | 
Devote some time and headspace to improving your skills with these Dark Reading events.
Machine Learning For Cybersecurity Not Cybercrime
Partner Perspectives  |  1/17/2017  | 
Cybercriminals have yet to adopt machine learning for offensive attack strategies - and they probably wont for a long time.
Crowdsourcing 20 Answers To Security Ops & IR Questions
Commentary  |  1/12/2017  | 
Those who know do not speak. Those who speak do not know. Why it pays to take a hard look at our own incident response functions and operations.
'Molecular' Cybersecurity Vs. Information Cybersecurity
Commentary  |  1/10/2017  | 
When it comes to industrial processes, security begins at the molecular level.
7 Ways To Fine-Tune Your Threat Intelligence Model
Slideshows  |  1/5/2017  | 
The nature of security threats is too dynamic for set-and-forget. Here are some ways to shake off that complacency.
Cyberrisk Through A Business Lens
Commentary  |  1/3/2017  | 
Boards and CEOs can focus on these critical factors to provide better cyberrisk governance.
Security Analytics: Don't Let Your Data Lake Turn Into A Data Swamp
Commentary  |  12/21/2016  | 
It's easy to get bogged down when looking for insights from data using Hadoop. But that doesn't have to happen, and these tips can help.
5 Things Security Pros Need To Know About Machine Learning
Slideshows  |  12/12/2016  | 
Experts share best practices for data integrity, pattern recognition and computing power to help enterprises get the most out of machine learning-based technology for cybersecurity.
Holiday Weekend Online Payment Card Fraud 20% Higher In 2016
Quick Hits  |  12/1/2016  | 
In the face of EMV chips, criminals turned online to commit card-not-present fraud this Black Friday and Cyber Monday.
Dark Reading Virtual Event Seeks To Break Security Myths, Conventional Wisdom
Commentary  |  11/14/2016  | 
Three keynotes, two panel sessions offer new ways to think about enterprise information security.
Surveys: Security Pros Overwhelmed, Not Communicating, Threat Intel Data
News  |  11/3/2016  | 
Two new studies underscore the challenges of making threat intelligence part of the enterprise arsenal.
New Free Tool Stops Petya Ransomware & Rootkits
News  |  10/20/2016  | 
Meanwhile, Locky puts ransomware on the Check Point Top Three Global Malware List for the first time ever.
7 Regional Hotbeds For Cybersecurity Innovation
Slideshows  |  10/18/2016  | 
These regions are driving cybersecurity innovation across the US with an abundance of tech talent, educational institutions, accelerators, incubators, and startup activity.
Encryption: A Backdoor For One Is A Backdoor For All
Commentary  |  10/14/2016  | 
We need legislation that allows law enforcement to find criminals and terrorists without eroding our security and privacy.
Data Science & Security: Overcoming The Communication Challenge
Commentary  |  10/7/2016  | 
Data scientists face a tricky task -- taking raw data and making it meaningful for both security and business teams. Here's how to bridge the gap.
Partners In The Battle Against Cyberthreats
Partners In The Battle Against Cyberthreats
Dark Reading Videos  |  10/6/2016  | 
George Karidis of CompuCom and Rodel Alejo from Intel stop by the Dark Reading News Desk.
Incident Response A Challenge For 98% Of InfoSec Pros
News  |  10/6/2016  | 
Too many alerts and too little staff leave security pros swimming in threat intel and begging for automation.
20 Questions To Explore With Security-as-a-Service Providers
Commentary  |  10/5/2016  | 
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
D-FENSE! Using Research To Craft Effective Cyber Defenses
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Videos  |  9/23/2016  | 
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack
Commentary  |  9/21/2016  | 
This slightly modified model is a practical way to keep attackers out of your systems.
20 Questions Security Leaders Need To Ask About Analytics
Commentary  |  9/15/2016  | 
The game of 20 questions is a great way to separate vendors that meets your needs from those who will likely disappoint.
Students Say They'd Only Pay Ransomware Operators About $50
Quick Hits  |  9/15/2016  | 
Webroot survey finds that students will pay more to recover their private photos than to recover their schoolwork.
Why The Security UI Could Help With Hiring
News  |  9/13/2016  | 
The incoming generation of security analysts has specific expectations for the user interface of security software, and businesses should pay attention.
Cybersecurity In The Obama Era
Slideshows  |  9/13/2016  | 
Our roundup of the Obama administrations major initiatives, executive orders and actions over the past seven and a half years. How would you grade the president's cybersecurity achievements?
Snowden May Help Explain Your Job To Your Family
Commentary  |  9/12/2016  | 
Hacking Oliver Stone's new film about whistleblower Edward Snowden.
Multi-Factor IT Authentication Hampers Progress, Say 47% US Companies
Quick Hits  |  9/9/2016  | 
IS Decisions survey finds organizations are looking for alternate to multi-factor verification, which they believe takes up time and slows productivity.
Look The Other Way: DDoS Attacks As Diversions
Look The Other Way: DDoS Attacks As Diversions
Dark Reading Videos  |  9/7/2016  | 
Black Hat News Desk talks to Joe Loveless of Neustar.
More Signs Point To Russian Cyberspy Connection In State Election Board Hacks
News  |  9/6/2016  | 
Researchers discover possible nation-sate link between attacks on Arizona and Illinois and recent attacks on Turkey and Ukraine governments.
Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain
Commentary  |  9/6/2016  | 
With nearly the same speed and precision that the human eye can identify a water bottle, the technology of deep learning is enabling the detection of malicious activity at the point of entry in real-time.
Why Social Media Sites Are The New Cyber Weapons Of Choice
Commentary  |  9/6/2016  | 
Facebook, LinkedIn, and Twitter cant secure their own environments, let alone yours. Its time to sharpen your security acumen.
The New Security Mindset: Embrace Analytics To Mitigate Risk
Commentary  |  9/5/2016  | 
Sure, conducting a penetration test can find a weakness. But to truly identify key areas of risk, organizations must start to think more creatively, just like todays hackers.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Impact of a Security Breach 2017
The Impact of a Security Breach 2017
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.