Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

End of Bibblio RCM includes -->

The Threat Of Security Analytics Complexity

SPONSORED: Congratulations! You're protecting your organization with layered security...but now you're drowning in more security analytics data flows than you can handle. Usman Choudhary, SVP and chief product officer of ThreatTrack talks to Brian Gillooly at the RSA Conference about how attackers can take advantage of that.

Comment  | 
Print  | 
//Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
Dr.T,
User Rank: Ninja
3/27/2016 | 6:10:21 PM
Secure Software
 

Obviously best defense is to build a secure software. Analytics is still basically a catch-up, we just need to re-think our software development practices and embed security while code is being written.
Dr.T
Dr.T,
User Rank: Ninja
3/27/2016 | 6:05:08 PM
Security Analytics
It is mandatory today. This is not a new topic, building knowledge to prevent from future attacks is what we do by default we just need to go beyond that and predicts attacks when there is no any predictability of it.
Dr.T
Dr.T,
User Rank: Ninja
3/27/2016 | 6:04:20 PM
Re: Nice post!
Big data and analytics certainly has big impacts. We just need to use right tools for the right vulnerabilities.

 
Dr.T
Dr.T,
User Rank: Ninja
3/27/2016 | 6:01:13 PM
Re: analytics
I have not used GoStats, is this like Google Analytics or anything more than that?
Dr.T
Dr.T,
User Rank: Ninja
3/27/2016 | 5:57:31 PM
Machine learning in security
A great idea but should be implemented very carefully. As we just experience with Microsoft bot machine could be thought in an unexpected way and results into unintended consequences.
randyorton
randyorton,
User Rank: Apprentice
3/26/2016 | 3:34:23 AM
Re: analytics
good one
kbannan100
kbannan100,
User Rank: Moderator
3/24/2016 | 1:05:05 PM
Nice post!
Excellent article and a true example of how analytics are changing everything -- from security to busines to innovation.


--KB


Karen Bannan, commenting for IDG and Informatica
AllWebAnalytics
AllWebAnalytics,
User Rank: Apprentice
3/24/2016 | 6:10:43 AM
analytics
Great article on security and analytics ... be it sites or data analytics play important tool and GA and Gostats are the ones we look for solutions.
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40363
PUBLISHED: 2022-09-29
A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.
CVE-2022-40890
PUBLISHED: 2022-09-29
A vulnerability in /src/amf/amf-context.c in Open5GS 2.4.10 and earlier leads to AMF denial of service.
CVE-2022-39250
PUBLISHED: 2022-09-29
Matrix JavaScript SDK is the Matrix Client-Server software development kit (SDK) for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of...
CVE-2022-40126
PUBLISHED: 2022-09-29
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
CVE-2022-40475
PUBLISHED: 2022-09-29
TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection via the component /cgi-bin/downloadFile.cgi.