Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Security Analysts Are Only Human
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/28/2019 | 9:35:01 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@Joe, that's one of the inherent principles of my explanation. The fact that there is a security shortage of personel further compiles the dilema that, quantitatively, large amounts of incidents cannot be reviewed effectively by humans. It's the premise behind "Next Gen" software/services, utilizing AI and malicious processes over signature-based analysis. 

Yes there are deficiencies. But I believe it to be a better allocation of funding to try and create more proficient and consistent coding then trying to throw bodies at it retroactively for review. I understand that if there is a shortage in one security facet then it may persist into others. But coders and app dev individuals that could be helpful in this endeavor are not part of that shortage.

Respectfully, I understand your inquiry. But I'm an Security Engineer. Crafting solutions is part of my day to day and this is again just one person's opinion at a plausible solution. Without attempting any solutions, we will all pontificate until this article is re-written in the years to come.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/27/2019 | 2:10:43 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
Agree - some time off, after all when Watson was tasked with diagnostics for cancer patients, the results would have killed some people.  True,  Don't think that is part of the medical oath and desired results field.  The cancer is, of course, eradicted along with the host. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/26/2019 | 10:33:26 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@REISEN: It should, of course, be theoretically possible to get to the point in AI/ML when a "robot" could use tactile senses just as well as other "senses" in performing surgical functions. That said, I suspect we're a ways off.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/26/2019 | 8:40:02 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
Ages ago I was discussing robot surgery with a dentist and he pointed out that however magnificent the results may be --- a robotic arm or hand lacks the ability of the human hand to "feel" something and evalute it by intuitive work rather than access of a database.  True and same applies for cyber.  Some human thought (not Vulcan logic) applies here.  We "know" certain things that cannot be quantified as wrote answers.  
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:07:13 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@Ryan: Of course, the thing to remember moving forward is that, if we accept the current narrative (which I don't, but that's a post for another day), there is a drastic shortage of cybersecurity talent. Consequently, assuming the correctness of that premise, where's the talent to make sure that the automation is working properly in and is properly tailored for the customer organization?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:05:12 PM
Re: Automation is KEY
@Dr.T: Moreover, sometimes these analysts will see malicious traffic and give a heads up to an affected organization -- who, sometimes, will expressly tell the tier-1 to not call them again (because they'd rather not know, because of the compliance triggers).

Perverse, but it happens.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:01:44 PM
Automate the fatigue?
Indeed, I've recently interviewed consultants on this very topic who are espousing the same message -- and pundits in the press and thought leadership are also calling for AI/ML/automation solutions in place of humans for handling the day-to-day. The machines don't get fatigued at the same rate as the humans do.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:22:43 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
As stated, receiving 10K alerts per day would be an impossible task to review without automated logic built into the coding of your SOC I agree. Also stated most are false possitive. One option could be generating those alerts in more intelligent ways.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:20:09 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
A human element will always be needed to one degree or another but they are prone to error. Agree. As being the weakest link in overall security, we are vulnerable too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:19:00 AM
Re: Automation is KEY
A SOC, coupled with the right internal and external intelligence, plus orchestration can effectively automate Tier 1 Agree. They can also use AI offload some initial workload.
Page 1 / 2   >   >>


DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerry,  11/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3350
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
CVE-2011-3352
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
CVE-2011-3349
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2019-10080
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
CVE-2019-10083
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.