Analytics

9/8/2015
03:00 PM
William Jackson
William Jackson
Slideshows
50%
50%

5 Free Security Analytics Tools

It's getting tougher to stay on top of the growing volume of security data generated. Take a look at some analytics tools for budget-conscious organizations.
Previous
1 of 6
Next


Source: securesoftwaredev.com

Source: securesoftwaredev.com

The adoption of mobile and cloud computing is expanding the security perimeter of the modern enterprise, and organizations are looking deeper into their IT infrastructure to monitor for malicious activity or software. These trends are producing a growing volume of threat data to be evaluated. To turn this data into meaningful intelligence, tools are needed that go beyond traditional security information and event management (SIEM) to integrate and analyze disparate types of data, structured and unstructured.

Analyzing threat data can be a non-trivial expense, especially for small and midsized organizations. Beyond software licensing, there is the cost of hardware, personnel, and training. But there are some free tools out there that can help.

 

William Jackson is writer with the <a href="http://www.techwritersbureau.com" target="_blank">Tech Writers Bureau</A>, with more than 35 years' experience reporting for daily, business and technical publications, including two decades covering information ... View Full Bio

Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jdubow570
100%
0%
jdubow570,
User Rank: Apprentice
9/17/2015 | 10:19:47 AM
Title is misleading
These may and probably are good tools, but Splunk is far from free and Symbiosis is reasonably priced but not free. Why not just call it like it is. Especially now when people are reeling form euphemistic labels like "Affordable Care" , "peace with Iran" , assorted red lines etc etc. 

 
OwenDale
100%
0%
OwenDale,
User Rank: Apprentice
9/9/2015 | 3:48:23 AM
5 Security AnalyticsTools
Fantastic information, this is helpful for me and other it people. thanks for sharing
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15572
PUBLISHED: 2018-08-20
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
CVE-2018-15573
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf...
CVE-2018-15574
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in the license editor in Reprise License Manager (RLM) through 12.2BL2. It is a cross-site scripting vulnerability in the /goform/edit_lf_get_data lf parameter via GET or POST. NOTE: the vendor has stated &quot;We do not consider this a vulnerability.&quot;
CVE-2018-15570
PUBLISHED: 2018-08-20
In waimai Super Cms 20150505, there is stored XSS via the /admin.php/Foodcat/editsave fcname parameter.
CVE-2018-15564
PUBLISHED: 2018-08-20
An issue was discovered in daveismyname simple-cms through 2014-03-11. There is a CSRF vulnerability that can delete any page via admin/?delpage=8.