Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Security Analysts Are Only Human
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
barefoot_marine
100%
0%
barefoot_marine,
User Rank: Apprentice
2/21/2019 | 1:22:07 PM
Automation is KEY
Definitely agree. Implementing solutions that replace Tier 1 assets is critical to effective security growth of an organization. Tier 1 analysts have the highest turnover and burnout rates. We ask them to help secure our infrastructure, but in reality, all they become are button monkeys, clicking yes/no. Barely able to keep up with that, let alone do research to validate the escalation. 

A SOC, coupled with the right internal and external intelligence, plus orchestration can effectively automate Tier 1, finally allowing jr SOC analysts a place to grow into more meaningful workflows.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
2/22/2019 | 3:45:00 PM
Minimizing Mistakes by Maximizing Actionable Intelligence
As the title denotes, Security Analysts are only human. A human element will always be needed to one degree or another but they are prone to error. For this reason, Security Professionals need to look towards maximizing automatic logic. As stated, receiving 10K alerts per day would be an impossible task to review without automated logic built into the coding of your SOC. We've made great progress but if we can continue to push the limits of our efficiency we can continue to diminish the degree of error that is inherent to our being.
MariaColeman
50%
50%
MariaColeman,
User Rank: Apprentice
2/25/2019 | 5:21:53 AM
Re: Automation is KEY
Very correctly and logically said.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:14:38 AM
Automation
Viewing alerts is unsustainable in its current form. The role needs to transition to a fully automated process I think this is the important step in security analysist workflow, they can not possible to go over all those false positives.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:17:49 AM
Re: Automation is KEY
Tier 1 analysts have the highest turnover and burnout rates. That makes sense. It is a tiring workflow, trying to catch one thing in a mass is frustrating too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:19:00 AM
Re: Automation is KEY
A SOC, coupled with the right internal and external intelligence, plus orchestration can effectively automate Tier 1 Agree. They can also use AI offload some initial workload.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:20:09 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
A human element will always be needed to one degree or another but they are prone to error. Agree. As being the weakest link in overall security, we are vulnerable too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/25/2019 | 11:22:43 AM
Re: Minimizing Mistakes by Maximizing Actionable Intelligence
As stated, receiving 10K alerts per day would be an impossible task to review without automated logic built into the coding of your SOC I agree. Also stated most are false possitive. One option could be generating those alerts in more intelligent ways.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:01:44 PM
Automate the fatigue?
Indeed, I've recently interviewed consultants on this very topic who are espousing the same message -- and pundits in the press and thought leadership are also calling for AI/ML/automation solutions in place of humans for handling the day-to-day. The machines don't get fatigued at the same rate as the humans do.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/25/2019 | 8:05:12 PM
Re: Automation is KEY
@Dr.T: Moreover, sometimes these analysts will see malicious traffic and give a heads up to an affected organization -- who, sometimes, will expressly tell the tier-1 to not call them again (because they'd rather not know, because of the compliance triggers).

Perverse, but it happens.
Page 1 / 2   >   >>


Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10560
PUBLISHED: 2020-03-30
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the S...
CVE-2020-5527
PUBLISHED: 2020-03-30
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource co...
CVE-2020-5551
PUBLISHED: 2020-03-30
Toyota 2017 Model Year DCU (Display Control Unit) allows an unauthenticated attacker within Bluetooth range to cause a denial of service attack and/or execute an arbitrary command. The affected DCUs are installed in Lexus (LC, LS, NX, RC, RC F), TOYOTA CAMRY, and TOYOTA SIENNA manufactured in the re...
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.