Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Security Analysts Are Only Human
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
RyanSepe
RyanSepe,
User Rank: Ninja
2/28/2019 | 9:35:01 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@Joe, that's one of the inherent principles of my explanation. The fact that there is a security shortage of personel further compiles the dilema that, quantitatively, large amounts of incidents cannot be reviewed effectively by humans. It's the premise behind "Next Gen" software/services, utilizing AI and malicious processes over signature-based analysis. 

Yes there are deficiencies. But I believe it to be a better allocation of funding to try and create more proficient and consistent coding then trying to throw bodies at it retroactively for review. I understand that if there is a shortage in one security facet then it may persist into others. But coders and app dev individuals that could be helpful in this endeavor are not part of that shortage.

Respectfully, I understand your inquiry. But I'm an Security Engineer. Crafting solutions is part of my day to day and this is again just one person's opinion at a plausible solution. Without attempting any solutions, we will all pontificate until this article is re-written in the years to come.
REISEN1955
REISEN1955,
User Rank: Ninja
2/27/2019 | 2:10:43 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
Agree - some time off, after all when Watson was tasked with diagnostics for cancer patients, the results would have killed some people.  True,  Don't think that is part of the medical oath and desired results field.  The cancer is, of course, eradicted along with the host. 
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/26/2019 | 10:33:26 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@REISEN: It should, of course, be theoretically possible to get to the point in AI/ML when a "robot" could use tactile senses just as well as other "senses" in performing surgical functions. That said, I suspect we're a ways off.
REISEN1955
REISEN1955,
User Rank: Ninja
2/26/2019 | 8:40:02 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
Ages ago I was discussing robot surgery with a dentist and he pointed out that however magnificent the results may be --- a robotic arm or hand lacks the ability of the human hand to "feel" something and evalute it by intuitive work rather than access of a database.  True and same applies for cyber.  Some human thought (not Vulcan logic) applies here.  We "know" certain things that cannot be quantified as wrote answers.  
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:07:13 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@Ryan: Of course, the thing to remember moving forward is that, if we accept the current narrative (which I don't, but that's a post for another day), there is a drastic shortage of cybersecurity talent. Consequently, assuming the correctness of that premise, where's the talent to make sure that the automation is working properly in and is properly tailored for the customer organization?
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:05:12 PM
Re: Automation is KEY
@Dr.T: Moreover, sometimes these analysts will see malicious traffic and give a heads up to an affected organization -- who, sometimes, will expressly tell the tier-1 to not call them again (because they'd rather not know, because of the compliance triggers).

Perverse, but it happens.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:01:44 PM
Automate the fatigue?
Indeed, I've recently interviewed consultants on this very topic who are espousing the same message -- and pundits in the press and thought leadership are also calling for AI/ML/automation solutions in place of humans for handling the day-to-day. The machines don't get fatigued at the same rate as the humans do.
Dr.T
Dr.T,
User Rank: Ninja
2/25/2019 | 11:22:43 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
As stated, receiving 10K alerts per day would be an impossible task to review without automated logic built into the coding of your SOC I agree. Also stated most are false possitive. One option could be generating those alerts in more intelligent ways.
Dr.T
Dr.T,
User Rank: Ninja
2/25/2019 | 11:20:09 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
A human element will always be needed to one degree or another but they are prone to error. Agree. As being the weakest link in overall security, we are vulnerable too.
Dr.T
Dr.T,
User Rank: Ninja
2/25/2019 | 11:19:00 AM
Re: Automation is KEY
A SOC, coupled with the right internal and external intelligence, plus orchestration can effectively automate Tier 1 Agree. They can also use AI offload some initial workload.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...