Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Security Analysts Are Only Human
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:17:49 AM
Re: Automation is KEY
Tier 1 analysts have the highest turnover and burnout rates. That makes sense. It is a tiring workflow, trying to catch one thing in a mass is frustrating too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:14:38 AM
Automation
Viewing alerts is unsustainable in its current form. The role needs to transition to a fully automated process I think this is the important step in security analysist workflow, they can not possible to go over all those false positives.
MariaColeman
50%
50%
MariaColeman,
User Rank: Apprentice
2/25/2019 | 5:21:53 AM
Re: Automation is KEY
Very correctly and logically said.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
2/22/2019 | 3:45:00 PM
Minimizing Mistakes by Maximizing Actionable Intelligence
As the title denotes, Security Analysts are only human. A human element will always be needed to one degree or another but they are prone to error. For this reason, Security Professionals need to look towards maximizing automatic logic. As stated, receiving 10K alerts per day would be an impossible task to review without automated logic built into the coding of your SOC. We've made great progress but if we can continue to push the limits of our efficiency we can continue to diminish the degree of error that is inherent to our being.
barefoot_marine
100%
0%
barefoot_marine,
User Rank: Apprentice
2/21/2019 | 1:22:07 PM
Automation is KEY
Definitely agree. Implementing solutions that replace Tier 1 assets is critical to effective security growth of an organization. Tier 1 analysts have the highest turnover and burnout rates. We ask them to help secure our infrastructure, but in reality, all they become are button monkeys, clicking yes/no. Barely able to keep up with that, let alone do research to validate the escalation. 

A SOC, coupled with the right internal and external intelligence, plus orchestration can effectively automate Tier 1, finally allowing jr SOC analysts a place to grow into more meaningful workflows.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42122
PUBLISHED: 2021-11-30
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH&Atilde;&cent;&acirc;&sbquo;&not;&acirc;&bdquo;&cent;s TopEase&Atilde;&sbquo;&Acirc;&reg; Platform Version &lt;= 7.1.27 on an object&Atilde;&cent;&acirc;&sbquo;&not;&acirc;&bdquo;&cent;s attributes with numeric...
CVE-2021-42123
PUBLISHED: 2021-11-30
Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH&Atilde;&cent;&acirc;&sbquo;&not;&acirc;&bdquo;&cent;s TopEase&Atilde;&sbquo;&Acirc;&reg; Platform Version &lt;= 7.1.27 in the File Upload Functions allows an authenticated remote attacker with Upload privileges to ...
CVE-2021-42544
PUBLISHED: 2021-11-30
Missing Rate Limiting in Web Applications operating on Business-DNA Solutions GmbH&Atilde;&cent;&acirc;&sbquo;&not;&acirc;&bdquo;&cent;s TopEase&Atilde;&sbquo;&Acirc;&reg; Platform Version &lt;= 7.1.27 on the Login Form allows an unauthenticated remote attacker to perform multiple login attempts, wh...
CVE-2021-42545
PUBLISHED: 2021-11-30
An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH&acirc;&euro;&trade;s TopEase&Acirc;&reg; Platform Version &lt;= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions.
CVE-2021-43771
PUBLISHED: 2021-11-30
Trend Micro Antivirus for Mac 2021 v11 (Consumer) is vulnerable to an improper access control privilege escalation vulnerability that could allow an attacker to establish a connection that could lead to full local privilege escalation within the application. Please note that an attacker must first o...