Friday, March 09, 2012

The Log Book Needs YOUR Help!

As most of you know, I’ve been working on a book about logs, logging and log management for some number of years. At this point, the book is almost done, but the author team is having some minor time commitment issues (aka “less time to write than originally estimated”) Smile).

So, do any of my esteemed blog readers (those adept in the dark arts of log analysis) care to help and write a few chapters here and there, in exchange for (lots of) immortal fame and (admittedly small amount of) cash?

Table of contents is here – if you see any chapters you’d like to help with, please let us know. I will post a list of chapters that really need help soon.

At this point, we have PLENTY of reviewing help, but we sure can use some writing help!

Friday, March 02, 2012

Monthly Blog Round-Up – February 2012

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month:
  1. Simple Log Review Checklist Released!” is often at the top – the checklist is still a very useful tool for many people
  2. On Free Log Management Tools” is a companion to the checklist below (updated version)
  3. My classic PCI DSS log review series is last on my Top 5: “Complete PCI DSS Log Review Procedures”; they are also useful for other compliance or security log review and log monitoring.
  4. Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2”, “SANS Top 5 Essential Log Reports Update!” and their predecessor  “Top5 SANS Log Reports Update DRAFT” also show up close to the top. IF YOU WANT TO VOLUNTEER TO FINISH THIS DOCUMENT- PLEASE EMAIL ME!
  5. On Choosing SIEM” is about the least wrong way of choosing a SIEM tool – as well as why the right way is so unpopular.
In addition, I’d like to draw your attention to a few posts from my Gartner blog:
  1. Many Faces of Application Security Monitoring
  2. Cloud Security Monitoring for IaaS, PaaS, SaaS
  3. More On Security Monitoring of Public Cloud Assets
  4. Cloud Security Monitoring!
  5. Cloud Security Monitoring: IaaS Conundrum
  6. Cloud IS Different: So Monitoring Must Be Different?
Also see my past monthly and annual “Top Posts” – 2007, 2008, 2009, 2010, 2011.

Disclaimer: all this content was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.

Dr Anton Chuvakin