Monday, June 01, 2015

Monthly Blog Round-Up – May 2015

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month:
  1. Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 judge.  Current emergence of open source log search tools, BTW, does not break cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 logic of that post. SIEM requires a lot of work, whecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r you paid for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 software, or not. [179 pageviews]
  2. Simple Log Review Checklist Released!” is often at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 top of this list – cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 checklist (updated version) [136 pageviews]
  3. Top 10 Criteria for a SIEM?” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating SIEM, see this document) [94 pageviews]
  4. My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r regulatory or not. It is also described in more detail in our Log Management book and mentioned in our PCI book (just out in its 4th edition!) [80+ pageviews to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 main tag]
  5. “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. [55 pageviews of total 4310 pageviews to all blog pages]
In addition, I’d like to draw your attention to a few recent posts from my Gartner blog:

Current research on cloud security monitoring:
Past research on security analytics:
Miscellaneous fun posts:

(see all my published Gartner research here)
Also see my past monthly and annual “Top Popular Blog Posts” – 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014.
Disclaimer: most content at SecurityWarrior blog was written before I joined Gartner on Aug 1, 2011 and is solely my personal view at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time of writing. For my current security blogging, go here.
Previous post in this endless series:

Dr Anton Chuvakin