Monday, March 26, 2012

“Big Analytics” for Security: A Harbinger or An Outlier? [BACKUP FROM DEAD GARTNER BLOG]

 NOTICE: after Gartner killed ALL blogs in late 2023, I am trying to salvage (via archive.org) some of the most critical blogs I've written while working there, and repost them with backdates here, for posterity. This one reminds the world that I popularized the term "output-driven SIEM"




  • You have 10 petabytes of security data in your Hadoop cluster.
  • You count RAM in terabytes and CPU cores in dozens.
  • You speak HiveQL better than you speak English.
  • You collect literally and unquestionably every timed record of activity in your organization – including transaction logs, IM messages, flows, anything.
  • You run queries over 13 months of data – and you do not have to take a vacation before the results come in.
  • You outgrew your market-leading SIEM product … 5 years ago.
  • You have statisticians (data scientists) on speed-dial – and on staff.
  • You run statistical models on volumes of security data before your morning coffee – and get good results.
  • Your organizations’ BI team thinks you are actually cool… despite being in security.

So….


are you a HARBINGER or an OUTLIER?


Is this the way information security will be done nearly everywhere in 3, 5, 10 years? (good arguments for this)

Or is this a case of “there are only 10 organizations in a Top 10 list”? (some arguments for this)

Is this the way we all need to learn to succeed with current and future threats?

Or is this the way to the top of the mountain that only the enlightened gurus will ever tread?

In any case, let’s keep this discussion going!

 

P.S.  By the way, remember that:  “If at first you don’t succeed, skydiving may not be for you.”  [by unknown] –> “If you keep failing with small data now, BIG DATA isn‘t for you!” [by Anton Chuvakin]

Friday, March 09, 2012

The Log Book Needs YOUR Help!

As most of you know, I’ve been working on a book about logs, logging and log management for some number of years. At this point, the book is almost done, but the author team is having some minor time commitment issues (aka “less time to write than originally estimated”) Smile).

So, do any of my esteemed blog readers (those adept in the dark arts of log analysis) care to help and write a few chapters here and there, in exchange for (lots of) immortal fame and (admittedly small amount of) cash?

Table of contents is here – if you see any chapters you’d like to help with, please let us know. I will post a list of chapters that really need help soon.

At this point, we have PLENTY of reviewing help, but we sure can use some writing help!

Friday, March 02, 2012

Monthly Blog Round-Up – February 2012

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month:
  1. Simple Log Review Checklist Released!” is often at the top – the checklist is still a very useful tool for many people
  2. On Free Log Management Tools” is a companion to the checklist below (updated version)
  3. My classic PCI DSS log review series is last on my Top 5: “Complete PCI DSS Log Review Procedures”; they are also useful for other compliance or security log review and log monitoring.
  4. Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2”, “SANS Top 5 Essential Log Reports Update!” and their predecessor  “Top5 SANS Log Reports Update DRAFT” also show up close to the top. IF YOU WANT TO VOLUNTEER TO FINISH THIS DOCUMENT- PLEASE EMAIL ME!
  5. On Choosing SIEM” is about the least wrong way of choosing a SIEM tool – as well as why the right way is so unpopular.
In addition, I’d like to draw your attention to a few posts from my Gartner blog:
  1. Many Faces of Application Security Monitoring
  2. Cloud Security Monitoring for IaaS, PaaS, SaaS
  3. More On Security Monitoring of Public Cloud Assets
  4. Cloud Security Monitoring!
  5. Cloud Security Monitoring: IaaS Conundrum
  6. Cloud IS Different: So Monitoring Must Be Different?
Also see my past monthly and annual “Top Posts” – 2007, 2008, 2009, 2010, 2011.

Disclaimer: all this content was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.