Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Dark Reading Launches New Tech Center On Threat Intelligence

Subsite of Dark Reading will look at collection and analysis of data on emerging threats

Today Dark Reading launches a new feature: the Threat Intelligence Tech Center, a subsite of Dark Reading devoted to bringing you more detailed news, insight, and in-depth reporting on the process of collecting and analyzing data on emerging threats.

This is the 12th of our Dark Reading Tech Centers, which are designed to provide you with a more focused view of specific issues, threats, and technologies in the world of IT security. The Tech Centers offer in-depth reports and studies, breaking news, and links to additional articles and information not found on the main Dark Reading site. Just as a traditional newspaper offers in-depth sections or supplements on sports, entertainment, or politics, the Dark Reading Tech Centers provide an additional range of news and information for readers who have an interest in specific aspects of IT security.

While Dark Reading is always covering the latest attacks and vulnerabilities found by security researchers, we have not previously had a space dedicated to the internal process of collecting data about new threats and analyzing it to help set priorities within the security department. With the introduction of the Threat Intelligence Tech Center, we will have the space and resources to offer more advice and recommendations on how to correlate threat information and use those conclusions to create an action plan for your organization. The goal of the Risk Intelligence Tech Center is to provide deeper analysis on this data collecting and analysis process, providing a level of technical depth that we have not provided before.

With this charter in mind, you can expect the Threat Intelligence Tech Center to take a slightly different perspective than the rest of the Dark Reading site -- it will offer specific recommendations on how to do threat analysis, as well as feedback on the potential impact of new threats.

The goal of the Threat Intelligence Tech Center is to help you evaluate the latest sophisticated threats and zero-day vulnerabilities, helping you to gauge the seriousness of the threat to your organization and how to prioritize your responses. In some cases, we'll offer "how to" articles that look at best practices and tools. In other cases, we'll analyze the threats themselves and provide insight on how they might impact enterprises such as yours.

Of course, the creation of the Threat Intelligence Tech Center doesn't mean that our coverage of breaking news of emerging threats on the main Dark Reading site will decrease. You'll continue to see news and analysis of new exploits on our home page, and feedback on next-generation threats will remain a key topic of discussion for our bloggers and our reporting staff. But when you click on those stories or blogs, you'll be brought here, to the Tech Center, so that you can see the full range and depth of analysis that we offer on the topic, and gain additional context to support what you're reading.

We think the Threat Intelligence Tech Center will help you understand the security challenges that your organization may face, and make good decisions about the tools and practices that might work best. But in the end, this is your site. Please let us know what you think of the Tech Center, our coverage of new threats, and what you'd like to see us cover in more depth. We can't guarantee we'll answer every query with a story or in-depth report, but we'll do our best to meet your needs for additional information and analysis.

If it has to do with the process of collecting and analyzing data about new threats, you'll find it here. And if you don't, let us know -- our goal is to be the most comprehensive source of security vulnerability and threat news and information on the Web.

Tim Wilson is Editor of Dark Reading Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21427
PUBLISHED: 2021-04-21
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in v...
CVE-2021-21426
PUBLISHED: 2021-04-21
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework ...
CVE-2020-36324
PUBLISHED: 2021-04-21
Wikimedia Quarry analytics-quarry-web before 2020-12-15 allows Reflected XSS because app.py does not explicitly set the application/json content type.
CVE-2020-28973
PUBLISHED: 2021-04-21
The ABUS Secvest wireless alarm system FUAA50000 (v3.01.17) fails to properly authenticate some requests to its built-in HTTPS interface. Someone can use this vulnerability to obtain sensitive information from the system, such as usernames and passwords. This information can then be used to reconfig...
CVE-2021-29456
PUBLISHED: 2021-04-21
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any...