My “Recent” Security Writing and Speaking
Now that I flooded with work (with more on the way), I am eternally procrastinating on my “ Fun Security Reading ” blog posts. So, let me at least try to blog about what I was WRITING if I don’t have time to blog about what I was reading ( Google Reader shared item feed ). The list is loosely sorted by time: My writing: “ HIPAA Logging HOWTO, Part 1 ” “HIPAA Logging HOWTO, Part 2” “ PCI Security: Q&A with Anton Chuvakin, PCI Compliance Expert ” “ PCI Security: Q&A with Anton Chuvakin, PCI Compliance Expert, PART 2 ” “ASSESSMENT SUCCESS: PCI DSS STANDARDS AND SECURE DATA STORAGE ” " How to Do Application Logging Right " (with Gunnar Petersen ) “ FISMA Logging HowTo, Part 1 ” “ Logging for FISMA part 2 : Detailed FISMA logging guidance ” “ Log management software can aid data security, boost IT accountability ” “ Log review for incident response, Part 1 ” “ A Pragmatic Approach to SIEM: Buy for Compliance, Use for S...