Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Security Analysts Are Only Human
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/28/2019 | 9:35:01 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@Joe, that's one of the inherent principles of my explanation. The fact that there is a security shortage of personel further compiles the dilema that, quantitatively, large amounts of incidents cannot be reviewed effectively by humans. It's the premise behind "Next Gen" software/services, utilizing AI and malicious processes over signature-based analysis. 

Yes there are deficiencies. But I believe it to be a better allocation of funding to try and create more proficient and consistent coding then trying to throw bodies at it retroactively for review. I understand that if there is a shortage in one security facet then it may persist into others. But coders and app dev individuals that could be helpful in this endeavor are not part of that shortage.

Respectfully, I understand your inquiry. But I'm an Security Engineer. Crafting solutions is part of my day to day and this is again just one person's opinion at a plausible solution. Without attempting any solutions, we will all pontificate until this article is re-written in the years to come.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/27/2019 | 2:10:43 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
Agree - some time off, after all when Watson was tasked with diagnostics for cancer patients, the results would have killed some people.  True,  Don't think that is part of the medical oath and desired results field.  The cancer is, of course, eradicted along with the host. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/26/2019 | 10:33:26 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@REISEN: It should, of course, be theoretically possible to get to the point in AI/ML when a "robot" could use tactile senses just as well as other "senses" in performing surgical functions. That said, I suspect we're a ways off.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/26/2019 | 8:40:02 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
Ages ago I was discussing robot surgery with a dentist and he pointed out that however magnificent the results may be --- a robotic arm or hand lacks the ability of the human hand to "feel" something and evalute it by intuitive work rather than access of a database.  True and same applies for cyber.  Some human thought (not Vulcan logic) applies here.  We "know" certain things that cannot be quantified as wrote answers.  
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:07:13 PM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
@Ryan: Of course, the thing to remember moving forward is that, if we accept the current narrative (which I don't, but that's a post for another day), there is a drastic shortage of cybersecurity talent. Consequently, assuming the correctness of that premise, where's the talent to make sure that the automation is working properly in and is properly tailored for the customer organization?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:05:12 PM
Re: Automation is KEY
@Dr.T: Moreover, sometimes these analysts will see malicious traffic and give a heads up to an affected organization -- who, sometimes, will expressly tell the tier-1 to not call them again (because they'd rather not know, because of the compliance triggers).

Perverse, but it happens.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:01:44 PM
Automate the fatigue?
Indeed, I've recently interviewed consultants on this very topic who are espousing the same message -- and pundits in the press and thought leadership are also calling for AI/ML/automation solutions in place of humans for handling the day-to-day. The machines don't get fatigued at the same rate as the humans do.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:22:43 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
As stated, receiving 10K alerts per day would be an impossible task to review without automated logic built into the coding of your SOC I agree. Also stated most are false possitive. One option could be generating those alerts in more intelligent ways.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:20:09 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
A human element will always be needed to one degree or another but they are prone to error. Agree. As being the weakest link in overall security, we are vulnerable too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:19:00 AM
Re: Automation is KEY
A SOC, coupled with the right internal and external intelligence, plus orchestration can effectively automate Tier 1 Agree. They can also use AI offload some initial workload.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11500
PUBLISHED: 2020-04-03
Zoom Client for Meetings through 4.6.9 uses the ECB mode of AES for video and audio encryption. Within a meeting, all participants use a single 128-bit key.
CVE-2020-11501
PUBLISHED: 2020-04-03
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks ...
CVE-2020-4273
PUBLISHED: 2020-04-03
IBM Spectrum Scale 4.2 and 5.0 could allow a local unprivileged attacker with intimate knowledge of the enviornment to execute commands as root using specially crafted input. IBM X-Force ID: 175977.
CVE-2019-18905
PUBLISHED: 2020-04-03
A Insufficient Verification of Data Authenticity vulnerability in autoyast2 of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows remote attackers to MITM connections when deprecated and unused functionality of autoyast is used to create images. This issue affects: SUSE Linux En...
CVE-2018-17954
PUBLISHED: 2020-04-03
A Least Privilege Violation vulnerability in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue affects: SUS...