Analytics
9/9/2013
11:53 AM
Tim Wilson
Tim Wilson
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Dark Reading Launches New Tech Center On Security Analytics

Dark Reading's new Security Analytics Tech Center offers a closer look at forensics, big data, and incident response

This week Dark Reading launches a new feature: the Security Analytics Tech Center, a subsite of Dark Reading devoted to bringing you more detailed news, insight, and in-depth reporting on the use of security data analysis techniques to identify sophisticated threats and improve enterprise defenses.

Security Analytics is the 22nd of our Dark Reading Tech Centers, which are drill-down sections designed to provide you with a more focused view of specific issues, threats, and technologies in the world of IT security. The Tech Centers offer in-depth reports and studies, breaking news, and links to additional articles and information not found on the main Dark Reading home page. Just as a traditional newspaper offers in-depth sections or supplements on sports, entertainment, or politics, the Dark Reading Tech Centers provide an additional range of news and information for readers who have an interest in specific aspects of IT security.

While Dark Reading has always covered issues related to security information and event management, data forensics, and incident response, recently we have seen a pronounced movement toward data analysis as a means of identifying persistent threats that are designed to slide under the radar of traditional security detection tools. By using sophisticated data analysis techniques, many enterprises are finding that they are able to more quickly find and stop obfuscated attacks that otherwise might have gone unnoticed.

These sophisticated security data analysis techniques -- collectively known as security analytics -- are also enabling some enterprises to identify attack trends that are specific to their own IT environments. By studying security data in depth, they find, it is sometimes possible to develop more effective, tailored defenses that improve overall enterprise data security.

The new Security Analytics Tech Center will take a deeper look at these changes in security data analysis, and offer insights on the tools, techniques, and best practices for analyzing security information, including emerging methods that use "big data." The goal of the Security Analytics Tech Center is to help you see how you can leverage these emerging tools and best practices in your enterprise tasks to identify nascent attacks and improve enterprise defenses.

Of course, the creation of this new Tech Center doesn't mean that our coverage of security analytics on the main Dark Reading site will decrease. You'll continue to see news and analysis of new strategies for forensics and incident response on our home page and in our opinion section. But when you click on those stories or blogs, you'll be brought here, to the Tech Center, so that you can see the full range and depth of analysis that we offer on the topic, and gain additional context to support what you're reading.

We think this new Tech Center will help provide more depth and context around your challenges in security forensics and incident response. But in the end, this is your site. Please let us know what you think of the Tech Center, our coverage of security analytics, and what you'd like to see us cover in more depth. We can't guarantee we'll answer every query with a story or in-depth report, but we'll do our best to meet your needs for additional information and analysis.

If it has to do with analyzing security data, emerging threats, or cyberforensics, you'll find coverage on Dark Reading. And if you don't, let us know -- our goal is to be the most comprehensive source of security news and information on the Web. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.