Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

7/9/2020
02:25 PM
50%
50%

56% of Large Companies Handle 1,000+ Security Alerts Each Day

For 70% of IT security professionals, the volume of security alerts has doubled in the past five years, researchers report.

The rising volume of security alerts is creating problems for operations teams struggling to handle them. More than half (56%) of large companies handle at least 1,000 alerts per day.

A new report on the state of SecOps and automation polled 427 IT security stakeholders, all of whom are responsible for corporate security at organizations with more than 1,000 employees. Seventy percent said the volume of security alerts they receive on a daily basis have more than doubled in the past five years. Most (93%) said they cannot address all alerts in the same day; 83% said staff has alert fatigue.

Researchers point to several drivers behind the increase. The primary reason is constant change to the type of security threats that must be blocked (67%), followed by the addition of new tools to monitor for these threats (60%), overall growth of business applications and services (57%), increase in cloud infrastructure (55%), and growth in user endpoints to monitor (52%).

Nearly all respondents agree the high alert volume is a burden. Most (68%) said they worry that important problems will be lost in a flood of minor issues, 66% are concerned about wasting time on chasing false positives, and half fear their team members will feel overwhelmed by alerts.

How many alerts is too many? Of businesses with more than 10,000 employees, 56% said they chase more than 1,000 alerts per day. Overall, 39% of all respondents said they handle 1,000 alerts per day. The same percentage experience between 100 and 1,000 alerts daily, researchers report.

Read more details and check out the full report here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before."

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...