Dr Anton Chuvakin Blog (Original)

This is Anton Chuvakin original blog (pre-Gartner) that I will now use to backup my Medium blog content (2023+)

Monday, September 17, 2007

New Paper: "Intrusion detection in the age of compliance"

Here is another paper in the "... in the age of compliance series" called "Intrusion detection in the age of compliance." The previous ones are:

  • "Log management in the age of compliance"

  • "Incident management in the age of compliance"

Posted by Anton Chuvakin at 11:41 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: chuvakin, compliance, paper, reading, security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Dr Anton Chuvakin

Dr Anton Chuvakin

RSS Feed

Subscribe Follow @anton_chuvakin

Recent Books

My Links

  • "PCI Compliance" book site
  • My website
  • My old presentations
  • My old portal Info-Secure.org
  • Old "Security Warrior" Book Site

Twitter

    follow me on Twitter

    Top Popular Posts

    • The Last Blog Post!
      This is my last blog post –for the foreseeable future. It is dated 7/31/2011 at 11:59PM. What happens tomorrow? A new life, of course! As...
    • Simple Log Review Checklist Released!
      Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exc...
    • Why No Open Source SIEM, EVER?
      Here is a perfect weekend post – on SIEM :-) Ok, all this Google web traffic of people searching for “ open source SIEM ” (sometimes “ ope...
    • Monthly Blog Round-Up – January 2018
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts based on last month’s visitor data  (excluding o...
    • Monthly Blog Round-Up – May 2017
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “New SIEM Whitepaper on Use C...

    Topics

    security (1012) log management (340) logging (308) compliance (234) PCI (187) logs (176) security management (129) reading (121) Monthly (119) conference (117) personal (95) blogging (92) trends (91) SIEM (89) humor (86) musings (83) presentation (75) SIM (67) SEM (64) future (46) news (46) malware (40) stupidity (40) intrusion (37) predictions (36) chuvakin (35) poll (31) RSA (30) standards (30) book (29) market (29) incident (28) SANS (27) paper (27) loglogic (26) risk (24) tips (23) warfare (23) CEE (19) PCI_Log_Review (19) marketing (19) Medium (17) TysonRhame (17) vendors (17) research (16) ROI (15) vulnerability (15) cloud (14) honeynet (14) privacy (14) 2010 (13) book review (13) forensics (13) metrics (12) Annual (11) jobs (11) review (10) 2009 (9) DLP (9) Medium Backup (9) data protection (9) podcast (9) websec (9) business (8) economics (8) saas (8) strategy (8) webinar (8) awareness (7) insiders (7) legal (7) 2008 (6) BlackHat (6) Detection Engineering (6) Gartner (6) attack (6) LogChat (5) career (5) consulting (5) database (5) haiku (5) myth (5) product management (5) qualys (5) security theater (5) software (5) virtual (5) 2007 (4) FAIL (4) application (4) encryption (4) incident response (4) mistakes (4) search (4) travel (4) virtualization (4) visualization (4) web logs (4) windows (4) 2011 (3) DRM (3) GRC (3) NIST (3) audit (3) awesomeness (3) correlation (3) government (3) interview (3) intrusion detection (3) open source (3) perimeter (3) politics (3) pontification (3) questions (3) vulnerability management (3) 2012 (2) HIPAA (2) ShmooCon (2) access (2) best practices (2) competitive (2) cybercrime (2) e-discovery (2) evangelism (2) glossary (2) keynote (2) knowledge management (2) new (2) rootkit (2) stratfor (2) tools (2) twitter (2) 0day (1) 2013 (1) 2019 (1) 2020 (1) Android (1) Cloud Threats (1) EMAP (1) IANS (1) IPv6 (1) SOC (1) analogy (1) announcements (1) architecture (1) authentication (1) blo (1) comments (1) computers (1) controversy (1) cool (1) current (1) data mining (1) fraud (1) geopolitics (1) guest post (1) identity (1) innovation (1) linux (1) mobile (1) obvious (1) platform (1) policy (1) reflections (1) semantic (1) storage (1) video (1) whitepaper (1)

    About Me

    Anton Chuvakin
    View my complete profile

    Blog Archive

    • ►  2024 (18)
      • ►  December (2)
      • ►  October (2)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (5)
      • ►  February (2)
      • ►  January (1)
    • ►  2023 (8)
      • ►  December (1)
      • ►  November (2)
      • ►  October (5)
    • ►  2019 (1)
      • ►  July (1)
    • ►  2018 (7)
      • ►  August (2)
      • ►  June (1)
      • ►  May (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2017 (12)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2016 (14)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2015 (15)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (3)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2014 (14)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (3)
      • ►  February (1)
      • ►  January (1)
    • ►  2013 (15)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2012 (25)
      • ►  December (3)
      • ►  November (2)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (3)
      • ►  June (2)
      • ►  May (2)
      • ►  April (2)
      • ►  March (2)
      • ►  February (2)
      • ►  January (2)
    • ►  2011 (68)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (12)
      • ►  June (4)
      • ►  May (8)
      • ►  April (6)
      • ►  March (10)
      • ►  February (8)
      • ►  January (13)
    • ►  2010 (137)
      • ►  December (22)
      • ►  November (12)
      • ►  October (6)
      • ►  September (11)
      • ►  August (15)
      • ►  July (7)
      • ►  June (6)
      • ►  May (10)
      • ►  April (10)
      • ►  March (14)
      • ►  February (15)
      • ►  January (9)
    • ►  2009 (193)
      • ►  December (11)
      • ►  November (12)
      • ►  October (23)
      • ►  September (16)
      • ►  August (15)
      • ►  July (13)
      • ►  June (18)
      • ►  May (11)
      • ►  April (20)
      • ►  March (19)
      • ►  February (14)
      • ►  January (21)
    • ►  2008 (311)
      • ►  December (18)
      • ►  November (20)
      • ►  October (23)
      • ►  September (15)
      • ►  August (19)
      • ►  July (19)
      • ►  June (22)
      • ►  May (28)
      • ►  April (45)
      • ►  March (27)
      • ►  February (33)
      • ►  January (42)
    • ▼  2007 (479)
      • ►  December (21)
      • ►  November (44)
      • ►  October (57)
      • ▼  September (57)
        • Interesting Log Management Interview
        • A Bit More on AV
        • On LogLogic
        • On Breach Economics
        • Another Presentation: FINAL Full Log Mining Slides
        • Log Trustworthiness Hierarchy
        • "Security profile" of me at Roer.com
        • Nobody Is That Dumb ... Oh, Wait VII
        • War on "Checkbox Security"
        • Another Incident, Another "Where WERE the logs?" S...
        • More on Logging Allowed Connections on the Firewall
        • A, then C, then I!?
        • One Last Time: "Choosing Your Log Management Appro...
        • Mind Blast from the Past: Psi-Weapons Again...
        • Far Future of Security ... Today
        • Absurd Patent on Log Management
        • On Enterprise Class
        • Interview On Logs for Compliance
        • Fun Privacy Discussion
        • On TDA Data Loss
        • Solaris BSM Logging for PCI
        • On Marketing Desperation
        • Dedicated to iPhone Users Everywhere ...
        • Simply Cannot Resist...
        • How Low Have I Fallen?
        • I Wish, I Wish or "What's exciting about LogLogic?"
        • Writing Your Own? He-he-he...
        • Logging Tips, Kinda
        • Fun Anti-sec Rant
        • Quick Tip: Password in Logs
        • On Using SIEMs with Log Management
        • Massive Log-like Data Analysis Research from Google
        • HIPAA, Insiders and Logging (Of Course!)
        • Fun Preso on Proxy Logs
        • A Few Notes on the MediaDefender Job
        • Mike Is Expanding ....
        • New Paper: "Intrusion detection in the age of comp...
        • A Sensible Piece on Logging in PCI DSS
        • Once More on Failure of Academic Research in Security
        • CA Next Generation Breach Law
        • Cook Your Own Log Standard in 30 Minutes or Less
        • Pre-post on Logging and Privacy
        • On "IT Audit Checklist: Logging, Monitoring, and R...
        • Guide to Hating Competitors
        • Inspired by Tor - Think!
        • On Viagra
        • Hole Cow! Auto-phisher Training Video
        • Mammoth Logging Tutorial Coming....
        • What Happens If One Marries ...
        • Nobody Is That Dumb ... Oh, Wait VI
        • So, Is DMCA Pure Evil or What?
        • On Obscure References
        • "PCI Compliance" Book Slashdotted....
        • On Assurance vs Indication
        • NEW Six Mistakes of Log Management Paper
        • IPv6 Fun
        • On Faking It
      • ►  August (51)
      • ►  July (49)
      • ►  June (34)
      • ►  May (39)
      • ►  April (21)
      • ►  March (30)
      • ►  February (30)
      • ►  January (46)
    • ►  2006 (370)
      • ►  December (24)
      • ►  November (25)
      • ►  October (24)
      • ►  September (31)
      • ►  August (34)
      • ►  July (31)
      • ►  June (23)
      • ►  May (20)
      • ►  April (52)
      • ►  March (41)
      • ►  February (33)
      • ►  January (32)
    • ►  2005 (34)
      • ►  December (34)

    Labels and Tags

    Copyright Anton Chuvakin. Simple theme. Powered by Blogger.