Dr Anton Chuvakin Blog (Original)

This is Anton Chuvakin original blog (pre-Gartner) that I will now use to backup my Medium blog content (2023+)

Monday, January 29, 2007

YOU Don't Sell Security Like, Do You?

Funny indeed!
Posted by Anton Chuvakin at 5:37 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: humor, security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Dr Anton Chuvakin

Dr Anton Chuvakin

RSS Feed

Subscribe Follow @anton_chuvakin

Recent Books

My Links

  • "PCI Compliance" book site
  • My website
  • My old presentations
  • My old portal Info-Secure.org
  • Old "Security Warrior" Book Site

Twitter

    follow me on Twitter

    Top Popular Posts

    • The Last Blog Post!
      This is my last blog post –for the foreseeable future. It is dated 7/31/2011 at 11:59PM. What happens tomorrow? A new life, of course! As...
    • Simple Log Review Checklist Released!
      Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exc...
    • Why No Open Source SIEM, EVER?
      Here is a perfect weekend post – on SIEM :-) Ok, all this Google web traffic of people searching for “ open source SIEM ” (sometimes “ ope...
    • Monthly Blog Round-Up – January 2018
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts based on last month’s visitor data  (excluding o...
    • Monthly Blog Round-Up – May 2017
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “New SIEM Whitepaper on Use C...

    Topics

    security (1012) log management (340) logging (308) compliance (234) PCI (187) logs (176) security management (129) reading (121) Monthly (119) conference (117) personal (95) blogging (92) trends (91) SIEM (89) humor (86) musings (83) presentation (75) SIM (67) SEM (64) future (46) news (46) malware (40) stupidity (40) intrusion (37) predictions (36) chuvakin (35) poll (31) RSA (30) standards (30) book (29) market (29) incident (28) SANS (27) paper (27) loglogic (26) risk (24) tips (23) warfare (23) CEE (19) PCI_Log_Review (19) marketing (19) Medium (17) TysonRhame (17) vendors (17) research (16) ROI (15) vulnerability (15) cloud (14) honeynet (14) privacy (14) 2010 (13) book review (13) forensics (13) metrics (12) Annual (11) jobs (11) review (10) 2009 (9) DLP (9) Medium Backup (9) data protection (9) podcast (9) websec (9) business (8) economics (8) saas (8) strategy (8) webinar (8) awareness (7) insiders (7) legal (7) 2008 (6) BlackHat (6) Detection Engineering (6) Gartner (6) attack (6) LogChat (5) career (5) consulting (5) database (5) haiku (5) myth (5) product management (5) qualys (5) security theater (5) software (5) virtual (5) 2007 (4) FAIL (4) application (4) encryption (4) incident response (4) mistakes (4) search (4) travel (4) virtualization (4) visualization (4) web logs (4) windows (4) 2011 (3) DRM (3) GRC (3) NIST (3) audit (3) awesomeness (3) correlation (3) government (3) interview (3) intrusion detection (3) open source (3) perimeter (3) politics (3) pontification (3) questions (3) vulnerability management (3) 2012 (2) HIPAA (2) ShmooCon (2) access (2) best practices (2) competitive (2) cybercrime (2) e-discovery (2) evangelism (2) glossary (2) keynote (2) knowledge management (2) new (2) rootkit (2) stratfor (2) tools (2) twitter (2) 0day (1) 2013 (1) 2019 (1) 2020 (1) Android (1) Cloud Threats (1) EMAP (1) IANS (1) IPv6 (1) SOC (1) analogy (1) announcements (1) architecture (1) authentication (1) blo (1) comments (1) computers (1) controversy (1) cool (1) current (1) data mining (1) fraud (1) geopolitics (1) guest post (1) identity (1) innovation (1) linux (1) mobile (1) obvious (1) platform (1) policy (1) reflections (1) semantic (1) storage (1) video (1) whitepaper (1)

    About Me

    Anton Chuvakin
    View my complete profile

    Blog Archive

    • ►  2024 (18)
      • ►  December (2)
      • ►  October (2)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (5)
      • ►  February (2)
      • ►  January (1)
    • ►  2023 (8)
      • ►  December (1)
      • ►  November (2)
      • ►  October (5)
    • ►  2019 (1)
      • ►  July (1)
    • ►  2018 (7)
      • ►  August (2)
      • ►  June (1)
      • ►  May (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2017 (12)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2016 (14)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2015 (15)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (3)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2014 (14)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (3)
      • ►  February (1)
      • ►  January (1)
    • ►  2013 (15)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2012 (25)
      • ►  December (3)
      • ►  November (2)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (3)
      • ►  June (2)
      • ►  May (2)
      • ►  April (2)
      • ►  March (2)
      • ►  February (2)
      • ►  January (2)
    • ►  2011 (68)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (12)
      • ►  June (4)
      • ►  May (8)
      • ►  April (6)
      • ►  March (10)
      • ►  February (8)
      • ►  January (13)
    • ►  2010 (137)
      • ►  December (22)
      • ►  November (12)
      • ►  October (6)
      • ►  September (11)
      • ►  August (15)
      • ►  July (7)
      • ►  June (6)
      • ►  May (10)
      • ►  April (10)
      • ►  March (14)
      • ►  February (15)
      • ►  January (9)
    • ►  2009 (193)
      • ►  December (11)
      • ►  November (12)
      • ►  October (23)
      • ►  September (16)
      • ►  August (15)
      • ►  July (13)
      • ►  June (18)
      • ►  May (11)
      • ►  April (20)
      • ►  March (19)
      • ►  February (14)
      • ►  January (21)
    • ►  2008 (311)
      • ►  December (18)
      • ►  November (20)
      • ►  October (23)
      • ►  September (15)
      • ►  August (19)
      • ►  July (19)
      • ►  June (22)
      • ►  May (28)
      • ►  April (45)
      • ►  March (27)
      • ►  February (33)
      • ►  January (42)
    • ▼  2007 (479)
      • ►  December (21)
      • ►  November (44)
      • ►  October (57)
      • ►  September (57)
      • ►  August (51)
      • ►  July (49)
      • ►  June (34)
      • ►  May (39)
      • ►  April (21)
      • ►  March (30)
      • ►  February (30)
      • ▼  January (46)
        • YOU Don't Sell Security Like, Do You?
        • On "TJX Was Not PCI Compliant. Who Pays?"
        • Re-tagged?
        • NBS Log Analysis Tricks Live On!
        • Book Review: ”Understanding Voice over IP Security"
        • Authentication: I Just Love This ...
        • Security Cartoons
        • "Risk House" Model
        • One Fun Prediction: Virtualization
        • ROI on Not Getting Your Ass Whooped
        • Logs Are Everywhere!
        • On Fruit, Low Hanging and Those Hanging Elsewhere
        • On Failures ...
        • On Math
        • Log Management Cloud
        • Logs and Compliance: Married for Life
        • More on Why Passwords Will Stay
        • Got a "Second Life" Office?
        • Now and Zen :-)
        • Security vs Networking
        • On "Eight daily steps to a more secure network"
        • Practicing "Best Practices" vs Doing Good Work?
        • On "Repairing Corrupted Windows Event Log Files"
        • On SIEM, etc
        • On Vendor vs Hacker: A Useful Reminder on How Worl...
        • Thought-Controlled Machinery Is Here
        • Cool Future Predictions
        • Natural Flow of Log Management
        • And The Logs Weren't There: Part I
        • My Security Predictions for 2007 ... Go!
        • Anton Security Tip of the Day #7: Don't Log or "Th...
        • Further Musings on Web Filters
        • Musings On Passwords
        • Another Fun Old Preso: "Threat and Vulnerability I...
        • On Getting to Blocked Web Sites
        • On Open Source in SIEM and Log Management
        • More on Amazing Lack of Teeth in HIPAA
        • Richard, Get'Em! :-)
        • Most People Don't Trust Their Security Software ...
        • Security Absurdity Lives On
        • On Visualizing Log Data
        • 2007 Prediction Criticism
        • Zone-H Defacement Story: Log Analysis at Work
        • More on The Same
        • So, Is There ANYBODY in Our Profession Who ...
        • Blog Tagging Onslaught
    • ►  2006 (370)
      • ►  December (24)
      • ►  November (25)
      • ►  October (24)
      • ►  September (31)
      • ►  August (34)
      • ►  July (31)
      • ►  June (23)
      • ►  May (20)
      • ►  April (52)
      • ►  March (41)
      • ►  February (33)
      • ►  January (32)
    • ►  2005 (34)
      • ►  December (34)

    Labels and Tags

    Copyright Anton Chuvakin. Simple theme. Powered by Blogger.