This is Anton Chuvakin original blog (pre-Gartner) that I will now use to backup my Medium blog content (2023+)
Thursday, December 29, 2016
An Open Letter to Android or “Android, You Are Shit!”
Thursday, December 01, 2016
Monthly Blog Round-Up – November 2016
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on developing security monitoring use cases here!
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? You be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” …
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” (also aged a bit by now) is a companion to the checklist (updated version)
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (now in its 4th edition!)
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this here in this paper).
- Threats Inside vs Insider Threat
- Can I Detect Advanced Threats With Just Flows/IPFIX?
- No, Virginia, It Does NOT Mean That! (detection vs prevention)
- Security: Automate And/Or Die?
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – October 2016
- All posts tagged monthly
Tuesday, November 01, 2016
Monthly Blog Round-Up – October 2016
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on security monitoring use cases here!
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? You be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” …
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version)
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this here in this paper).
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (now in its 4th edition!)
- Threats Inside vs Insider Threat
- Can I Detect Advanced Threats With Just Flows/IPFIX?
- No, Virginia, It Does NOT Mean That! (detection vs prevention)
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – September 2016
- All posts tagged monthly
Monday, October 03, 2016
Monthly Blog Round-Up – September 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? You be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” …
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on security monitoring use cases here!
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this here in this paper).
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (now in its 4th edition!)
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version)
- Threats Inside vs Insider Threat
- Can I Detect Advanced Threats With Just Flows/IPFIX?
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – August 2016
- All posts tagged monthly
Thursday, September 01, 2016
Monthly Blog Round-Up – August 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? You be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” …
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on security monitoring use cases here!
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version)
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (now in its 4th edition!)
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this here in this paper).
- Threats Inside vs Insider Threat
- Can I Detect Advanced Threats With Just Flows/IPFIX?
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – July 2016
- All posts tagged monthly
Monday, August 01, 2016
Monthly Blog Round-Up – July 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? You be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” … [235 pageviews]
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on security monitoring use cases here! [156 pageviews]
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) [56 pageviews]
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (out in its 4th edition!)[40+ pageviews to the main tag]
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this here in this paper). [70 pageviews of total 2891 pageviews to all blog page]
- Can I Detect Advanced Threats With Just Flows/IPFIX?
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- My Detection Confidence Survey Results
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – June 2016
- All posts tagged monthly
Friday, July 01, 2016
Monthly Blog Round-Up – June 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” … [239 pageviews]
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on security monitoring use cases here! [96 pageviews]
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (out in its 4th edition!)[90+ pageviews to the main tag]
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) [89 pageviews]
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this here in this paper). [70 pageviews of total 3475 pageviews to all blog page]
- Our “How to Plan and Execute Modern Security Incident Response” Publishes
- What Is Different About Security Incident Response Today?
- Incident Response Becomes Threat Response … OR Does It: IR Research Commencing
- Our “Comparison of Endpoint Detection and Response Technologies and Solutions” Paper Publishes
- Our Paper “Endpoint Detection and Response Tool Architecture and Operations Practices” Publishes
- One More Time On EDR Use Cases
- EDR Tool Wins – Only For The Enlightened?
- EDR Mud Fight: Kernel or Userland?
- Using EDR For Remediation?
- EDR Research Commencing: Call To Action!
- Where Does EDR End and “NG AV” Begin?
- Reality Check on EDR / ETDR
- My Paper on Endpoint Tools Publishes (2013)
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- RSA 2016: Musings and Contemplations
- My Detection Confidence Survey Results
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – May 2016
- All posts tagged monthly
Tuesday, June 07, 2016
Monthly Blog Round-Up – May 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” … [262 pageviews]
- “A Myth of An Expert Generalist” is a fun rant on what I think it means to be “a security expert” today; it argues that you must specialize within security to really be called an expert [103 pageviews]
- “Top 10 Criteria for a SIEM?” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating SIEM, see this document [2015 update]) [80 pageviews]
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our new 2016 research on security monitoring use cases here! [74 pageviews]
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) [65 pageviews of total 3971 pageviews to all blog pages]
- Our “How to Plan and Execute Modern Security Incident Response” Publishes
- What Is Different About Security Incident Response Today?
- Incident Response Becomes Threat Response … OR Does It: IR Research Commencing
- Our Paper “Endpoint Detection and Response Tool Architecture and Operations Practices” Publishes
- One More Time On EDR Use Cases
- EDR Tool Wins – Only For The Enlightened?
- EDR Mud Fight: Kernel or Userland?
- Using EDR For Remediation?
- EDR Research Commencing: Call To Action!
- Where Does EDR End and “NG AV” Begin?
- Reality Check on EDR / ETDR
- My Paper on Endpoint Tools Publishes (2013)
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- RSA 2016: Musings and Contemplations
- My Detection Confidence Survey Results
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- Your SOC Nuclear Triad
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – April 2016
- All posts tagged monthly
Tuesday, May 03, 2016
Monthly Blog Round-Up – April 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” … [223 pageviews]
- “Top 10 Criteria for a SIEM?” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating SIEM, see this document [2015 update]) [116 pageviews]
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our new 2016 research on security monitoring use cases here! [84 pageviews]
- “A Myth of An Expert Generalist” is a fun rant on what I think it means to be “a security expert” today; it argues that you must specialize within security to really be called an expert [80 pageviews]
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) [78 pageviews of total 3857 pageviews to all blog pages]
- Our “How to Plan and Execute Modern Security Incident Response” Publishes
- What Is Different About Security Incident Response Today?
- Incident Response Becomes Threat Response … OR Does It: IR Research Commencing
- One More Time On EDR Use Cases
- EDR Tool Wins – Only For The Enlightened?
- EDR Mud Fight: Kernel or Userland?
- Using EDR For Remediation?
- EDR Research Commencing: Call To Action!
- Where Does EDR End and “NG AV” Begin?
- Reality Check on EDR / ETDR
- My Paper on Endpoint Tools Publishes (2013)
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- RSA 2016: Musings and Contemplations
- My Detection Confidence Survey Results
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- Your SOC Nuclear Triad
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – March 2016
- All posts tagged monthly
Friday, April 01, 2016
Monthly Blog Round-Up – March 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” … [230 pageviews]
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) [112 pageviews]
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our new 2016 research on security monitoring use cases here! [92 pageviews]
- My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (out in its 4th edition!) [84+ pageviews to the main tag]
- “Top 10 Criteria for a SIEM?” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating SIEM, see this document [2015 update]) [78 pageviews of total 4113 pageviews to all blog pages]
- What Is Different About Security Incident Response Today?
- Incident Response Becomes Threat Response … OR Does It: IR Research Commencing
- EDR Mud Fight: Kernel or Userland?
- Using EDR For Remediation?
- EDR Research Commencing: Call To Action!
- Where Does EDR End and “NG AV” Begin?
- Reality Check on EDR / ETDR
- My Paper on Endpoint Tools Publishes (2013)
- Sad Hilarity of Predictive Analytics in Security?
- Anton’s Favorite Threat Hunting Links
- RSA 2016: Musings and Contemplations
- My Detection Confidence Survey Results
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- Your SOC Nuclear Triad
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – Feburary 2016
- All posts tagged monthly
Monday, March 07, 2016
Monthly Blog Round-Up – Feburary 2016
- “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” … [267 pageviews]
- “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our new 2016 research on security monitoring use cases here! [106 pageviews]
- “Top 10 Criteria for a SIEM?” came from one of my last projects I did when running mySIEM consulting firm in 2009-2011 (for my recent work on evaluating SIEM, see this document [2015 update]) [104 pageviews]
- “SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?” is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this here in this paper). [70 pageviews]
- “Simple Log Review Checklist Released!” is often at the top of this list – this aging checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) [65 pageviews of total 3861 pageviews to all blog pages]
- What Is Different About Security Incident Response Today?
- Incident Response Becomes Threat Response … OR Does It: IR Research Commencing
- EDR Research Commencing: Call To Action!
- Where Does EDR End and “NG AV” Begin?
- Reality Check on EDR / ETDR
- My Paper on Endpoint Tools Publishes (2013)
- My Detection Confidence Survey Results
- No, Virginia, It Does NOT Mean That! (detection and prevention)
- “Deception as Detection” or Give Deception a Chance?
- Jumping Security Maturity FAIL!
- Security: Automate And/Or Die?
- Your SOC Nuclear Triad
- On Tanks vs Tractors
- Defeat The Casual Attacker First!!
- On “Defender’s Advantage”
(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at the time of writing. For my current security blogging, go here.
Previous post in this endless series:
- Monthly Blog Round-Up – January 2016
- All posts tagged monthly