Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

News & Commentary
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerryCommentary
How the helping hand of artificial intelligence allows security teams to remain human while protecting themselves from their own humanity being used against them.
By John McClurg Sr. VP & CISO, BlackBerry, 11/18/2019
Comment0 comments  |  Read  |  Post a Comment
Tamper Protection Arrives for Microsoft Defender ATP
Dark Reading Staff, Quick Hits
The feature, designed to block unauthorized changes to security features, is now generally available.
By Dark Reading Staff , 10/14/2019
Comment0 comments  |  Read  |  Post a Comment
Close the Gap Between Cyber-Risk and Business Risk
Brian Contos, CISO & VP of Techology Innovation at VerodinCommentary
Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.
By By Brian Contos, CISO, Verodin , 10/11/2019
Comment0 comments  |  Read  |  Post a Comment
AIOps: The State of Full Packet Capture Enters the Age of Practicality
Randy Caldejon, co-founder, CEO and CTO, CounterFlowCommentary
How machine learning and artificial intelligence are changing the game of acting on large volumes of network data in near real time.
By Randy Caldejon co-founder, CEO and CTO, CounterFlow, 10/1/2019
Comment1 Comment  |  Read  |  Post a Comment
Splunk Buys Microservices Monitoring Firm Omnition
Dark Reading Staff, Quick Hits
The purchase is intended to boost Splunk's capabilities in microservices architectures.
By Dark Reading Staff , 9/4/2019
Comment0 comments  |  Read  |  Post a Comment
Overburdened SOC Analysts Shift Priorities
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/30/2019
Comment2 comments  |  Read  |  Post a Comment
Stronger Defenses Force Cybercriminals to Rethink Strategy
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.
By Kelly Sheridan Staff Editor, Dark Reading, 8/14/2019
Comment0 comments  |  Read  |  Post a Comment
Internet Routing Security Initiative Launches Online 'Observatory'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Mutually Agreed Norms for Routing Security (MANRS) lets network operators and the public view online router incidents worldwide.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/13/2019
Comment1 Comment  |  Read  |  Post a Comment
Back to Basics with Log Management, SIEMs & MSSPs
Terry Sweeney, Contributing Editor
Not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.
By Terry Sweeney Contributing Editor, 7/12/2019
Comment3 comments  |  Read  |  Post a Comment
Don't Just Tune Your SIEM, Retune It
Robin Hicks, IT Security Engineer, CEDAR CX TechnologiesCommentary
Your SIEM isn't a set-it-and-forget-it proposition. It's time for a spring cleaning.
By Robin Hicks IT Security Engineer, CEDAR CX Technologies, 5/29/2019
Comment1 Comment  |  Read  |  Post a Comment
Mist Computing Startup Distributes Security AI to the Network Edge
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
MistNet, founded by former Juniper employees, moves AI processing to the network edge to build distributed detection and analysis models for security.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/24/2019
Comment2 comments  |  Read  |  Post a Comment
Effective Pen Tests Follow These 7 Steps
Curtis Franklin Jr., Senior Editor at Dark Reading
Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Sophos Buys Rook Security to Build DarkBytes Platform
Dark Reading Staff, Quick Hits
The acquisition fits into Sophos' plan to offer resellable managed detection and response services.
By Dark Reading Staff , 5/3/2019
Comment1 Comment  |  Read  |  Post a Comment
Russia Regularly Spoofs Regional GPS
Robert Lemos, Contributing WriterNews
The nation is a pioneer in spoofing and blocking satellite navigation signals, causing more than 9,800 incidents in the past three years, according to an analysis of navigational data.
By Robert Lemos Contributing Writer, 3/26/2019
Comment7 comments  |  Read  |  Post a Comment
Dragos Buys ICS Firm with US Dept. of Energy Roots
Dark Reading Staff, Quick Hits
NexDefense ICS security tool will be offered for free by Dragos.
By Dark Reading Staff , 3/18/2019
Comment0 comments  |  Read  |  Post a Comment
4 Reasons to Take an 'Inside Out' View of Security
Earl D. Matthews, Senior Vice President and Chief Strategy Officer at VerodinCommentary
When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.
By Earl D. Matthews Senior Vice President and Chief Strategy Officer at Verodin, 3/14/2019
Comment0 comments  |  Read  |  Post a Comment
Startup Armor Scientific Launches Multifactor Identity System
Robert Lemos, Contributing WriterNews
Company aims to replace usernames and passwords by combining GPS location, biometrics, and keys issued through a blockchain-based network.
By Robert Lemos Contributing Writer, 3/4/2019
Comment0 comments  |  Read  |  Post a Comment
Here's What Happened When a SOC Embraced Automation
Heather Hixon,  Senior Solutions Architect, DFLabsCommentary
Despite initial apprehension, security engineers and analysts immediately began to notice a variety of benefits.
By Heather Hixon Senior Solutions Architect, DFLabs, 3/4/2019
Comment1 Comment  |  Read  |  Post a Comment
Human Negligence to Blame for the Majority of Insider Threats
Steve Zurier, Contributing WriterNews
In 98% of the assessments conducted for its research, Dtex found employees exposed proprietary company information on the Web a 20% jump from 2018.
By Steve Zurier Contributing Writer, 2/21/2019
Comment1 Comment  |  Read  |  Post a Comment
The Evolution of SIEM
Chetan Mundhada, Vice President of Sales at NETMONASTERYCommentary
Expectations for these security information and event management systems have grown over the years, in ways that just aren't realistic.
By Chetan Mundhada Vice President of Sales at NETMONASTERY, 1/23/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13157
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
CVE-2012-2079
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2019-11325
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
CVE-2019-18887
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
CVE-2019-18888
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...