Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Overhauling the 3 Pillars of Security Operations
Newest First  |  Oldest First  |  Threaded View
caniwisteve
50%
50%
caniwisteve,
User Rank: Apprentice
9/23/2018 | 11:05:16 PM
Ahhh - it makes sense. Overhaul the 3 pillars of context, coverage and collaboration
Modernizing organisation need people, process technology that:

1) understand the 'context' of data sources

2) has the 'coverage; of key data sources (instead of leaving gaps in areas with growing attack vectors)

3) enables 'collaboration' across the whole stack (DevSecBizOps) using AI to reduce human analysis factor
virtualphil
50%
50%
virtualphil,
User Rank: Apprentice
9/18/2018 | 12:55:04 PM
Something new
Was this written in the 2000? 

https://www.mn.uio.no/ifi/english/research/groups/is/events/architecture-seminar/bygstad.pdf

"In his much cited article "Dismantling the silos: extracting new value from IT investments in public

administration" (2001) Frank Bannister analysed the growth of silo systems in the public sector."

Data silos have been A KNOWN ISSUE since 2001!

Have anything new to offer than react 100x faster? Does that imply man-machine interface becase I do not believe you can get a 100x speed improvement fromm the human side of the equation.  Maybe we need to hire an additional 99 to 1 people to make this work?

Would have been nice to actualy define what the 3 pillars are and what you propose they become. I do not see anything like that here.


How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17667
PUBLISHED: 2019-10-17
Comtech H8 Heights Remote Gateway 2.5.1 devices allow XSS and HTML injection via the Site Name (aka SiteName) field.
CVE-2019-17666
PUBLISHED: 2019-10-17
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
CVE-2019-17607
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
CVE-2019-17608
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
CVE-2019-17609
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.