Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Analytics
Page 1 / 2   >   >>
Cyber Is the New Cold War & AI Is the Arms Race
Commentary  |  6/10/2021  | 
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race.
Cartoon Caption Winner: Road Trip
Commentary  |  6/7/2021  | 
And the winner of Dark Reading's cartoon caption contest is ...
Modern SOCs a 'Painful' Challenge Amid Growing Complexity: Report
Quick Hits  |  5/28/2021  | 
A new study examines the tools and technologies driving investment and activities for security operations centers.
Devo: SIEM Continues to Evolve with Tech Trends and Emerging Threats
Commentary  |  5/26/2021  | 
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Ted Julian, senior VP of product at Devo. As security data volumes continue to increase, SIEM's evolution will only continue.
Businesses Boost Security Budgets. Where Will the Money Go?
News  |  5/25/2021  | 
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.
Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations
News  |  5/20/2021  | 
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conference.
Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime, APT Groups
News  |  5/19/2021  | 
Incident response cases and research show how the red-team tool has become a become a go-to for attackers.
FBI's IC3 Logs 1M Complaints in 14 Months
Quick Hits  |  5/18/2021  | 
The FBI's IC3 reports COVID-related scams and an increase in online retail may be behind the upswing in complaints.
Name That Toon: Road Trip
Commentary  |  5/17/2021  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
SOC Teams Burdened by Alert Fatigue Explore XDR
Quick Hits  |  5/14/2021  | 
ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately
85% of Data Breaches Involve Human Interaction: Verizon DBIR
News  |  5/13/2021  | 
Ransomware, phishing, and Web application attacks all increased during a year in which the majority of attacks involved a human element.
Dragos & IronNet Partner on Critical Infrastructure Security
Quick Hits  |  5/13/2021  | 
The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
When AI Becomes the Hacker
News  |  5/13/2021  | 
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
Wanted: The (Elusive) Cybersecurity 'All-Star'
News  |  5/5/2021  | 
Separate workforce studies by (ISC) and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
Imperva to Buy API Security Firm CloudVector
Quick Hits  |  5/3/2021  | 
The deal is intended to expand Imperva's API security portfolio, officials say.
Ransomware Task Force Publishes Framework to Fight Global Threat
News  |  4/30/2021  | 
An 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.
Do Cyberattacks Affect Stock Prices? It Depends on the Breach
News  |  4/27/2021  | 
A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.
XDR: A Game-Changer in Enterprise Threat Detection
XDR: A Game-Changer in Enterprise Threat Detection
Dark Reading Videos  |  4/27/2021  | 
Omdia's Eric Parizo highlights four capabilities that show how XDR technology is reinventing enterprise threat detection.
Name That Toon: Greetings, Earthlings
Commentary  |  4/22/2021  | 
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
Rapid7 Acquires Velociraptor Open Source Project
Quick Hits  |  4/21/2021  | 
The company plans to use Velociraptor's technology and insights to build out its own incident response capabilities.
Global Dwell Time Drops as Ransomware Attacks Accelerate
News  |  4/13/2021  | 
The length of time attackers remain undiscovered in a target network has fallen to 24 days, researchers report, but ransomware plays a role.
Dark Reading to Upgrade Site Design, Performance
Commentary  |  4/13/2021  | 
Improvements will make site content easier to navigate, faster, and more functional.
Microsoft Uses Machine Learning to Predict Attackers' Next Steps
News  |  4/12/2021  | 
Researchers build a model to attribute attacks to specific groups based on tactics, techniques, and procedures, and then figure out their next move.
Omdia Research Spotlight: XDR
Commentary  |  4/12/2021  | 
Few emerging cybersecurity market segments are garnering more attention than XDR. Here, Omdia highlights its recent research on XDR.
CISA Launches New Threat Detection Dashboard
Quick Hits  |  4/9/2021  | 
Aviary is a new dashboard that works with CISA's Sparrow threat detection tool.
Cartoon Caption Winner: Something Seems Afoul
Commentary  |  4/7/2021  | 
And the winner of Dark Readings's March cartoon caption contest is ...
48% of Security Pros Prohibited From Intelligence-Sharing
Quick Hits  |  3/9/2021  | 
Some do so anyway, according to new Kaspersky research.
Kaseya Buys Managed SOC Provider
Quick Hits  |  2/24/2021  | 
Purchase extends offerings for MSP and SMB customers
CrowdStrike Buys Log Management Startup Humio for $400M
Quick Hits  |  2/18/2021  | 
CrowdStrike plans to use Humio's technology to continue building out its extended detection and response platform.
How to Submit a Column to Dark Reading
Commentary  |  2/15/2021  | 
Have a new idea, a lesson learned, or a call to action for your fellow cybersecurity professionals? Here's how to submit your Commentary pieces to Dark Reading.
Multivector Attacks Demand Security Controls at the Messaging Level
Commentary  |  2/10/2021  | 
As a Google-identified attack reveals, security teams need to look beyond VPNs and network infrastructure to the channels where social engineering takes place.
Cartoon Caption Winner: Insider Threat
Commentary  |  2/8/2021  | 
And the winner of Dark Reading's January cartoon caption contest is ...
An Observability Pipeline Could Save Your SecOps Team
Commentary  |  2/3/2021  | 
Traditional monitoring approaches are proving brittle as security operations teams need better visibility into dynamic environments.
Security in a Complex World
Commentary  |  2/3/2021  | 
Innovation and complexity can co-exist; the key is to use innovation to make ever-expanding complexity comprehensible and its effects predictable.
Vulnerability Management Has a Data Problem
Commentary  |  1/14/2021  | 
Security teams have an abundance of data, but most of it lacks the context necessary to improve remediation outcomes.
6 Open Source Tools for Your Security Team
Slideshows  |  1/6/2021  | 
Open source tools can be great additions to your cloud security arsenal. Here are a half-dozen to get you started.
HelpSystems Acquires Data Security Firm Vera
Quick Hits  |  12/24/2020  | 
The purchase is intended to increase London-based HelpSystems' file collaboration security capabilities.
Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely
News  |  12/4/2020  | 
Homomorphic encryption and federated learning could allow groups to share data and analysis while protecting the actual information.
Driven by Ransomware, Cyber Claims Rise in Number & Value
News  |  11/30/2020  | 
Companies are on track to file 27% more cyber claims in 2020, one insurer estimates, while another underwriter finds five out of every 100 companies file a claim each year.
A Call for Change in Physical Security
Commentary  |  11/16/2020  | 
We're at an inflection point. The threats we face are dynamic, emerging, and global. Are you ready?
Overlooked Security Risks of the M&A Rebound
Commentary  |  11/10/2020  | 
Successful technology integration, post-merger, is tricky in any market, and never more so than with today's remote work environments and distributed IT infrastructure.
Cado Security Gets $1.5 Million Seed
Quick Hits  |  11/5/2020  | 
The seed funding round was led by Ten Eleven Ventures.
Hexagon Announces Deal to Acquire PAS Global
Quick Hits  |  11/4/2020  | 
The Houston-based PAS Global will operate as part of Hexagon's PPM (formerly Intergraph Process, Power & Marine) division.
Containers for Data Analysis Are Rife With Vulnerabilities
News  |  11/4/2020  | 
Old software components and the inclusion of unnecessary code created a massive attack surface area in containers for scientific analysis, researchers say.
Developers' Approach to App Testing Could Cut Flaw Fix Times by 80 Days
News  |  10/27/2020  | 
An analysis of more than 130,000 active applications found more with at least one high-severity flaw compared with 2019.
Microsoft Tops Q3 List of Most-Impersonated Brands
News  |  10/19/2020  | 
The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.
7 Tips for Choosing Security Metrics That Matter
Slideshows  |  10/19/2020  | 
Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.
Deepfake Detection Poses Problematic Technology Race
News  |  9/18/2020  | 
Experts hold out little hope for a robust technical solution in the long term.
Sumo Logic IPO Prices Higher Than Expected
News  |  9/17/2020  | 
Co-founder and CTO Christian Beedgen explains what this means for the future of the cloud-based data analytics company.
Developers Need More Usable Static Code Scanners to Head Off Security Bugs
News  |  8/11/2020  | 
As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.
Page 1 / 2   >   >>


Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.