News & Commentary

Latest Content tagged with Analytics
Page 1 / 2   >   >>
The Containerization of Artificial Intelligence
Commentary  |  3/16/2018
AI automates repetitive tasks and alleviates mundane functions that often haunt decision makers. But it's still not a sure substitute for security best practices.
Critical Start to Buy Advanced Threat Analytics
Quick Hits  |  3/15/2018
Firms previously had teamed up in SOC services.
AI and Machine Learning: Breaking Down Buzzwords
News  |  2/13/2018
Security experts explain two of today's trendiest technologies to explain what they mean and where you need them.
Better Security Analytics? Clean Up the Data First!
Commentary  |  2/12/2018
Even the best analytics algorithms using incomplete and unclean data won't yield useful results.
5 Questions to Ask about Machine Learning
Commentary  |  1/31/2018
Marketing hyperbole often exceeds reality. Here are questions you should ask before buying.
Endpoint and Mobile Top Security Spending at 57% of Businesses
Quick Hits  |  1/26/2018
Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.
Meet Chronicle: Alphabet's New Cybersecurity Business
News  |  1/24/2018
Google parent company Alphabet introduces Chronicle, which will combine a security analytics platform and VirusTotal.
One Identity Acquires Balabit
Quick Hits  |  1/17/2018
Union expands One Identity's privileged access management and analytics offerings.
How AI Would Have Caught the Forever 21 Breach
Commentary  |  1/17/2018
Companies must realize that the days of the desktop/server model are over and focus on "nontraditional" devices.
Researchers Offer a 'VirusTotal for ICS'
News  |  1/16/2018
Free online sandbox, honeypot tool simulates a real-world industrial network environment.
France Might Vet Acquisitions of AI, Data Protection Firms
Quick Hits  |  1/12/2018
Finance minister says country may add artificial intelligence and data security to list of nation's strategically important, regulated sectors
Thales Acquires Gemalto, Integrates Digital Business
Quick Hits  |  1/2/2018
Thales will combine its digital assets with Gemalto's as part of a new Global Business Unit.
Security Worries? Let Policies Automate the Right Thing
Commentary  |  12/20/2017
By programming 'good' cybersecurity practices, organizations can override bad behavior, reduce risk, and improve the bottom line.
Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence
Commentary  |  12/19/2017
CTI falls into three main categories -- tactical, operational, and strategic -- and answers questions related to the "who, what, and why" of a cyber attack.
Top 8 Cybersecurity Skills IT Pros Need in 2018
Slideshows  |  12/18/2017
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.
Improve Signal-to-Noise Ratio with 'Content Curation:' 5 Steps
Commentary  |  12/5/2017
By intelligently managing signatures, correlation rules, filters and searches, you can see where your security architecture falls down, and how your tools can better defend the network.
'Blocking and Tackling' in the New Age of Security
News  |  12/1/2017
In a pep talk to CISOs, the chief security strategist at PSCU advises teams to prioritize resilience in addition to security.
The Looming War of Good AI vs. Bad AI
Commentary  |  11/28/2017
The rise of artificial intelligence, machine learning, hivenets, and next-generation morphic malware is leading to an arms race that enterprises must prepare for now.
McAfee Looks to Cloud with Skyhigh Acquisition
Quick Hits  |  11/27/2017
McAfee agrees to buy CASB provider Skyhigh Networks, demonstrating a strong focus on cloud security.
IBM, Nonprofits Team Up in New Free DNS Service
News  |  11/17/2017
Quad9 blocks malicious sites used in phishing, other nefarious activity.
121 Pieces of Malware Flagged on NSA Employee's Home Computer
News  |  11/16/2017
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.
Death of the Tier 1 SOC Analyst
News  |  11/16/2017
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
Deception Technology: Prevention Reimagined
Commentary  |  11/15/2017
How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.
Siemens Teams Up with Tenable
News  |  11/8/2017
ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.
Windows 10 Update: 10 Key New Security Features
Slideshows  |  10/25/2017
Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.
Advanced Analytics + Frictionless Security: What CISOS Need to Know
Commentary  |  10/25/2017
Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy.
Opera, Vivaldi Co-Founder Talks Internet Privacy
News  |  10/24/2017
Most people don't understand the extent to which their personal information is at risk, says Jon von Tetzchner, who founded the Opera and Vivaldi browser firms.
Security Tops Use Cases for Endpoint Data
Quick Hits  |  10/11/2017
Businesses increasingly use endpoint data for security investigations, eDiscovery, and device migration to Windows 10.
Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC
News  |  10/10/2017
Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.
Unstructured Data: The Threat You Cannot See
Commentary  |  10/10/2017
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control.
Artificial Intelligence: Experts Talk Ethical, Security Concerns
News  |  10/10/2017
Global leaders weigh the benefits and dangers of a future in which AI plays a greater role in business and security strategy.
7 SIEM Situations That Can Sack Security Teams
Slideshows  |  9/27/2017
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.
How Security Metrics Fail Us & How We Fail Them
How Security Metrics Fail Us & How We Fail Them
Dark Reading Videos  |  9/26/2017
Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
FBI's Freese Shares Risk Management Tips
News  |  9/26/2017
Deputy Assistant Director Donald Freese advises enterprises to lead with a business case and not fear addressing the C-suite on risk management.
PassGAN: Password Cracking Using Machine Learning
News  |  9/25/2017
Researchers demo how deep neural networks can be trained to generate passwords better than the best password-cracking tools.
SMBs Paid $301 Million to Ransomware Attackers
Quick Hits  |  9/21/2017
But small- to midsized businesses are taking a tougher stand against ransomware attacks, according to a survey released today of the 2016-2017 period.
Siemens' New ICS/SCADA Security Service a Sign of the Times
News  |  9/19/2017
Major ICS/SCADA vendors are entering the managed security services business with cloud-based offerings for energy and other industrial sectors.
Security Orchestration & Automation: Parsing the Options
Commentary  |  9/15/2017
Once you head down the path of orchestration, security teams will need to decide how much automation they are ready for. Here's how.
A New Model for 'Mathematically Provable Security'
A New Model for 'Mathematically Provable Security'
Dark Reading Videos  |  9/14/2017
Winn Schwartau, CEO of The Security Awareness Company, says we all know the old model of security is broken and it's time for a new one.
Endpoint Security Overload
News  |  9/5/2017
CISOs and their teams are over-investing in endpoint security tools, driving inefficiency and a need to consolidate data.
Security Analytics: Making the Leap from Data Lake to Meaningful Insight
Commentary  |  8/29/2017
Once you've got a lake full of data, it's essential that your analysis isn't left stranded on the shore.
Curbing the Cybersecurity Workforce Shortage with AI
Commentary  |  8/18/2017
By using cognitive technologies, an organization can address the talent shortage by getting more productivity from current employees and improving processes.
What CISOs Need to Know about the Psychology behind Security Analysis
Commentary  |  8/14/2017
Bandwidth, boredom and cognitive bias are three weak spots that prevent analysts from identifying threats. Here's how to compensate.
Using AI to Break Detection Models
News  |  7/25/2017
Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
How Bad Data Alters Machine Learning Results
News  |  6/13/2017
Machine learning models tested on single sources of data can prove inaccurate when presented with new sources of information.
How to Succeed at Incident Response Metrics
Commentary  |  6/2/2017
Establishing a baseline of what information you need is an essential first step.
How to Integrate Threat Intel & DevOps
Commentary  |  5/4/2017
Automating intelligence can help your organization in myriad ways.
Call Center Fraud Spiked 113% in 2016
News  |  4/26/2017
Criminals are increasingly spoofing caller ID using VoIP apps including Skype or Google Voice to hide their identity and location, according to a report released today by Pindrop Labs.
Machine Learning in Security: 4 Factors to Consider
News  |  4/21/2017
Key factors to consider before adding machine learning to your security strategy.
10 Questions To Get Practical Answers At Interop ITX
Commentary  |  4/14/2017
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Page 1 / 2   >   >>

Disappearing Act: Dark Reading Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark Reading,  3/12/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.