Analytics
9/9/2013
11:53 AM
Tim Wilson
Tim Wilson
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Dark Reading Launches New Tech Center On Security Analytics

Dark Reading's new Security Analytics Tech Center offers a closer look at forensics, big data, and incident response

This week Dark Reading launches a new feature: the Security Analytics Tech Center, a subsite of Dark Reading devoted to bringing you more detailed news, insight, and in-depth reporting on the use of security data analysis techniques to identify sophisticated threats and improve enterprise defenses.

Security Analytics is the 22nd of our Dark Reading Tech Centers, which are drill-down sections designed to provide you with a more focused view of specific issues, threats, and technologies in the world of IT security. The Tech Centers offer in-depth reports and studies, breaking news, and links to additional articles and information not found on the main Dark Reading home page. Just as a traditional newspaper offers in-depth sections or supplements on sports, entertainment, or politics, the Dark Reading Tech Centers provide an additional range of news and information for readers who have an interest in specific aspects of IT security.

While Dark Reading has always covered issues related to security information and event management, data forensics, and incident response, recently we have seen a pronounced movement toward data analysis as a means of identifying persistent threats that are designed to slide under the radar of traditional security detection tools. By using sophisticated data analysis techniques, many enterprises are finding that they are able to more quickly find and stop obfuscated attacks that otherwise might have gone unnoticed.

These sophisticated security data analysis techniques -- collectively known as security analytics -- are also enabling some enterprises to identify attack trends that are specific to their own IT environments. By studying security data in depth, they find, it is sometimes possible to develop more effective, tailored defenses that improve overall enterprise data security.

The new Security Analytics Tech Center will take a deeper look at these changes in security data analysis, and offer insights on the tools, techniques, and best practices for analyzing security information, including emerging methods that use "big data." The goal of the Security Analytics Tech Center is to help you see how you can leverage these emerging tools and best practices in your enterprise tasks to identify nascent attacks and improve enterprise defenses.

Of course, the creation of this new Tech Center doesn't mean that our coverage of security analytics on the main Dark Reading site will decrease. You'll continue to see news and analysis of new strategies for forensics and incident response on our home page and in our opinion section. But when you click on those stories or blogs, you'll be brought here, to the Tech Center, so that you can see the full range and depth of analysis that we offer on the topic, and gain additional context to support what you're reading.

We think this new Tech Center will help provide more depth and context around your challenges in security forensics and incident response. But in the end, this is your site. Please let us know what you think of the Tech Center, our coverage of security analytics, and what you'd like to see us cover in more depth. We can't guarantee we'll answer every query with a story or in-depth report, but we'll do our best to meet your needs for additional information and analysis.

If it has to do with analyzing security data, emerging threats, or cyberforensics, you'll find coverage on Dark Reading. And if you don't, let us know -- our goal is to be the most comprehensive source of security news and information on the Web. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.