Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Dark Reading Launches New Tech Center On Security Analytics

Dark Reading's new Security Analytics Tech Center offers a closer look at forensics, big data, and incident response

This week Dark Reading launches a new feature: the Security Analytics Tech Center, a subsite of Dark Reading devoted to bringing you more detailed news, insight, and in-depth reporting on the use of security data analysis techniques to identify sophisticated threats and improve enterprise defenses.

Security Analytics is the 22nd of our Dark Reading Tech Centers, which are drill-down sections designed to provide you with a more focused view of specific issues, threats, and technologies in the world of IT security. The Tech Centers offer in-depth reports and studies, breaking news, and links to additional articles and information not found on the main Dark Reading home page. Just as a traditional newspaper offers in-depth sections or supplements on sports, entertainment, or politics, the Dark Reading Tech Centers provide an additional range of news and information for readers who have an interest in specific aspects of IT security.

While Dark Reading has always covered issues related to security information and event management, data forensics, and incident response, recently we have seen a pronounced movement toward data analysis as a means of identifying persistent threats that are designed to slide under the radar of traditional security detection tools. By using sophisticated data analysis techniques, many enterprises are finding that they are able to more quickly find and stop obfuscated attacks that otherwise might have gone unnoticed.

These sophisticated security data analysis techniques -- collectively known as security analytics -- are also enabling some enterprises to identify attack trends that are specific to their own IT environments. By studying security data in depth, they find, it is sometimes possible to develop more effective, tailored defenses that improve overall enterprise data security.

The new Security Analytics Tech Center will take a deeper look at these changes in security data analysis, and offer insights on the tools, techniques, and best practices for analyzing security information, including emerging methods that use "big data." The goal of the Security Analytics Tech Center is to help you see how you can leverage these emerging tools and best practices in your enterprise tasks to identify nascent attacks and improve enterprise defenses.

Of course, the creation of this new Tech Center doesn't mean that our coverage of security analytics on the main Dark Reading site will decrease. You'll continue to see news and analysis of new strategies for forensics and incident response on our home page and in our opinion section. But when you click on those stories or blogs, you'll be brought here, to the Tech Center, so that you can see the full range and depth of analysis that we offer on the topic, and gain additional context to support what you're reading.

We think this new Tech Center will help provide more depth and context around your challenges in security forensics and incident response. But in the end, this is your site. Please let us know what you think of the Tech Center, our coverage of security analytics, and what you'd like to see us cover in more depth. We can't guarantee we'll answer every query with a story or in-depth report, but we'll do our best to meet your needs for additional information and analysis.

If it has to do with analyzing security data, emerging threats, or cyberforensics, you'll find coverage on Dark Reading. And if you don't, let us know -- our goal is to be the most comprehensive source of security news and information on the Web. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11107
PUBLISHED: 2020-04-02
An issue was discovered in XAMPP before 7.2.29, 7.3.x before 7.3.16 , and 7.4.x before 7.4.4 on Windows. An unprivileged user can change a .exe configuration in xampp-contol.ini for all users (including admins) to enable arbitrary command execution.
CVE-2020-11444
PUBLISHED: 2020-04-02
Sonatype Nexus Repository Manager 3.x up to and including 3.21.2 has Incorrect Access Control.
CVE-2020-7617
PUBLISHED: 2020-04-02
ini-parser through 0.0.2 is vulnerable to Prototype Pollution.The library could be tricked into adding or modifying properties of Object.prototype using a '__proto__' payload.
CVE-2020-8835
PUBLISHED: 2020-04-02
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the intr...
CVE-2020-8423
PUBLISHED: 2020-04-02
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.