Analytics //

Security Monitoring

News & Commentary
Improving the Adoption of Security Automation
Dan Koloski, Vice President, Oracle's Systems Management and Security  products groupCommentary
Four barriers to automation and how to overcome them.
By Dan Koloski Vice President, Oracle's Systems Management and Security products group, 6/20/2018
Comment0 comments  |  Read  |  Post a Comment
Panorays Debuts With $5 Million Investment
Dark Reading Staff, Quick Hits
Panorays, a company focusing on third-party security issues for the enterprise, has exited stealth mode.
By Dark Reading Staff , 6/5/2018
Comment0 comments  |  Read  |  Post a Comment
I, for One, Welcome Our Robotic Security Overlords
Danelle Au, VP Strategy, SafeBreachCommentary
Automation will come in more subtle ways than C-3PO and it's transforming cybersecurity.
By Danelle Au VP Strategy, SafeBreach, 6/5/2018
Comment0 comments  |  Read  |  Post a Comment
Building a Safe, Efficient, Cost-Effective Security Infrastructure
Ken Mills, General Manager of IoT, Surveillance and Security, Dell EMCCommentary
The Industrial Internet of Things allows organizations to address both physical and digital security concerns.
By Ken Mills General Manager of IoT, Surveillance and Security, Dell EMC, 6/4/2018
Comment0 comments  |  Read  |  Post a Comment
FireEye Offers Free Tool to Detect Malicious Remote Logins
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Open source GeoLogonalyzer helps to weed out hackers exploiting stolen credentials to log into their targets.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/30/2018
Comment0 comments  |  Read  |  Post a Comment
Machine Learning, Artificial Intelligence & the Future of Cybersecurity
Craig Hinkley, CEO, WhiteHat SecurityCommentary
The ability to learn gives security-focused AI and ML apps unrivaled speed and accuracy over their more basic, automated predecessors. But they are not a silver bullet. Yet.
By Craig Hinkley CEO, WhiteHat Security, 5/30/2018
Comment0 comments  |  Read  |  Post a Comment
6 Steps for Applying Data Science to Security
Steve Zurier, Freelance Writer
Two experts share their data science know-how in a tutorial focusing on internal DNS query analysis.
By Steve Zurier Freelance Writer, 5/23/2018
Comment0 comments  |  Read  |  Post a Comment
New Survey Shows Hybrid Cloud Confidence
Dark Reading Staff, Quick Hits
Executives are mostly confident in their hybrid cloud security, according to the results of a new survey.
By Dark Reading Staff , 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
How Measuring Security for Risk & ROI Can Empower CISOs
Vikram Phatak, Chief Executive Officer of NSS LabsCommentary
For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?
By Vikram Phatak Chief Executive Officer of NSS Labs, 3/28/2018
Comment1 Comment  |  Read  |  Post a Comment
The Containerization of Artificial Intelligence
Hamid Karimi, VP of Business Development at Beyond SecurityCommentary
AI automates repetitive tasks and alleviates mundane functions that often haunt decision makers. But it's still not a sure substitute for security best practices.
By Hamid Karimi VP of Business Development at Beyond Security, 3/16/2018
Comment1 Comment  |  Read  |  Post a Comment
Critical Start to Buy Advanced Threat Analytics
Dark Reading Staff, Quick Hits
Firms previously had teamed up in SOC services.
By Dark Reading Staff , 3/15/2018
Comment1 Comment  |  Read  |  Post a Comment
Security Worries? Let Policies Automate the Right Thing
John De Santis, CEO, HyTrustCommentary
By programming 'good' cybersecurity practices, organizations can override bad behavior, reduce risk, and improve the bottom line.
By John De Santis CEO, HyTrust, 12/20/2017
Comment7 comments  |  Read  |  Post a Comment
Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence
Adam Meyers, VP of Intelligence, CrowdStrikeCommentary
CTI falls into three main categories -- tactical, operational, and strategic -- and answers questions related to the "who, what, and why" of a cyber attack.
By Adam Meyers VP of Intelligence, CrowdStrike, 12/19/2017
Comment1 Comment  |  Read  |  Post a Comment
Improve Signal-to-Noise Ratio with 'Content Curation:' 5 Steps
Justin Monti, CTO, MKACyberCommentary
By intelligently managing signatures, correlation rules, filters and searches, you can see where your security architecture falls down, and how your tools can better defend the network.
By Justin Monti CTO, MKACyber, 12/5/2017
Comment0 comments  |  Read  |  Post a Comment
The Looming War of Good AI vs. Bad AI
Derek Manky, Global Security Strategist, FortinetCommentary
The rise of artificial intelligence, machine learning, hivenets, and next-generation morphic malware is leading to an arms race that enterprises must prepare for now.
By Derek Manky Global Security Strategist, Fortinet, 11/28/2017
Comment1 Comment  |  Read  |  Post a Comment
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/16/2017
Comment6 comments  |  Read  |  Post a Comment
Death of the Tier 1 SOC Analyst
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/16/2017
Comment3 comments  |  Read  |  Post a Comment
Deception Technology: Prevention Reimagined
Ofer Israeli, CEO & Founder, Illusive NetworksCommentary
How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.
By Ofer Israeli CEO & Founder, Illusive Networks, 11/15/2017
Comment1 Comment  |  Read  |  Post a Comment
Siemens Teams Up with Tenable
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/8/2017
Comment0 comments  |  Read  |  Post a Comment
Advanced Analytics + Frictionless Security: What CISOS Need to Know
Saryu Nayyar, CEO, GuruculCommentary
Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy.
By Saryu Nayyar CEO, Gurucul, 10/25/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by AnnaEverson
Current Conversations What is that for ?
In reply to: What is that for?
Post Your Own Reply
More Conversations
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12716
PUBLISHED: 2018-06-25
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its l...
CVE-2018-12705
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have XSS via the SSID (it is validated only on the client side).
CVE-2018-12706
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have a Buffer Overflow via a long Authorization HTTP header.
CVE-2018-12714
PUBLISHED: 2018-06-24
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial o...
CVE-2018-12713
PUBLISHED: 2018-06-24
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was ...