Analytics //

Security Monitoring

News & Commentary
Improve Signal-to-Noise Ratio with 'Content Curation:' 5 Steps
Justin Monti, CTO, MKACyberCommentary
By intelligently managing signatures, correlation rules, filters and searches, you can see where your security architecture falls down, and how your tools can better defend the network.
By Justin Monti CTO, MKACyber, 12/5/2017
Comment0 comments  |  Read  |  Post a Comment
The Looming War of Good AI vs. Bad AI
Derek Manky, Global Security Strategist, FortinetCommentary
The rise of artificial intelligence, machine learning, hivenets, and next-generation morphic malware is leading to an arms race that enterprises must prepare for now.
By Derek Manky Global Security Strategist, Fortinet, 11/28/2017
Comment1 Comment  |  Read  |  Post a Comment
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/16/2017
Comment6 comments  |  Read  |  Post a Comment
Death of the Tier 1 SOC Analyst
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/16/2017
Comment1 Comment  |  Read  |  Post a Comment
Deception Technology: Prevention Reimagined
Ofer Israeli, CEO & Founder, Illusive NetworksCommentary
How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.
By Ofer Israeli CEO & Founder, Illusive Networks, 11/15/2017
Comment1 Comment  |  Read  |  Post a Comment
Siemens Teams Up with Tenable
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/8/2017
Comment0 comments  |  Read  |  Post a Comment
Advanced Analytics + Frictionless Security: What CISOS Need to Know
Saryu Nayyar, CEO, GuruculCommentary
Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy.
By Saryu Nayyar CEO, Gurucul, 10/25/2017
Comment0 comments  |  Read  |  Post a Comment
Unstructured Data: The Threat You Cannot See
Charles Fullwood, Software Practice Director at Force 3Commentary
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control.
By Charles Fullwood Software Practice Director at Force 3, 10/10/2017
Comment0 comments  |  Read  |  Post a Comment
How to Live by the Code of Good Bots
Ido Safruti,  Founder and CTO at PerimeterXCommentary
Following these four tenets will show the world that your bot means no harm.
By Ido Safruti Founder and CTO at PerimeterX, 9/27/2017
Comment0 comments  |  Read  |  Post a Comment
7 SIEM Situations That Can Sack Security Teams
Dawn Kawamoto, Associate Editor, Dark Reading
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/27/2017
Comment2 comments  |  Read  |  Post a Comment
Security Orchestration & Automation: Parsing the Options
Dario Forte, CEO, DFLabsCommentary
Once you head down the path of orchestration, security teams will need to decide how much automation they are ready for. Here's how.
By Dario Forte CEO, DFLabs, 9/15/2017
Comment1 Comment  |  Read  |  Post a Comment
What CISOs Need to Know about the Psychology behind Security Analysis
Kumar Saurabh, CEO and co-founder of LogicHubCommentary
Bandwidth, boredom and cognitive bias are three weak spots that prevent analysts from identifying threats. Here's how to compensate.
By Kumar Saurabh CEO and co-founder of LogicHub, 8/14/2017
Comment1 Comment  |  Read  |  Post a Comment
Using AI to Break Detection Models
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/25/2017
Comment0 comments  |  Read  |  Post a Comment
FireEye CEO Shares State of IT Threat Landscape
InformationWeek Staff, CommentaryVideo
FireEye CEO Kevin Mandia talks about the state of the IT threat landscape and where enterprises should focus their attention when it comes to cybersecurity.
By InformationWeek Staff , 6/23/2017
Comment0 comments  |  Read  |  Post a Comment
How to Succeed at Incident Response Metrics
Tom Webb, Incident Handler, SANS Internet Storm CenterCommentary
Establishing a baseline of what information you need is an essential first step.
By Tom Webb Incident Handler, SANS Internet Storm Center, 6/2/2017
Comment1 Comment  |  Read  |  Post a Comment
How to Integrate Threat Intel & DevOps
Andrew Storms, VP Security Services, New ContextCommentary
Automating intelligence can help your organization in myriad ways.
By Andrew Storms VP Security Services, New Context, 5/4/2017
Comment1 Comment  |  Read  |  Post a Comment
Forget the Tax Man: Time for a DNS Security Audit
Ericka Chickowski, Contributing Writer, Dark Reading
Here's a 5-step DNS security review process that's not too scary and will help ensure your site availability and improve user experience.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/11/2017
Comment0 comments  |  Read  |  Post a Comment
As Cloud Use Expands, So Do Security Blind Spots, Studies Show
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Three-quarters of IaaS and SaaS apps arent monitored.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/4/2017
Comment2 comments  |  Read  |  Post a Comment
Data Visualization: Keeping an Eye on Security
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRACommentary
Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data. So why does it end up as an afterthought?
By Joshua Goldfarb Co-founder & Chief Product Officer, IDDRA, 3/27/2017
Comment3 comments  |  Read  |  Post a Comment
Prioritizing Threats: Why Most Companies Get It Wrong
Michael A. Davis, CTO of CounterTackCommentary
To stay safer, focus on multiple-threat attack chains rather than on individual threats.
By Michael A. Davis CTO of CounterTack, 3/24/2017
Comment6 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allhealthpost
Current Conversations great post to read
In reply to: reply
Post Your Own Reply
Posted by LouiseMiller
Current Conversations wow, what can I say 
In reply to: Great post
Post Your Own Reply
More Conversations
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.