Posts

Showing posts from February, 2012

See You At RSA 2012!

Just a quick note to my readers: see you at RSA 2012 next week. I am around Monday-Thursday and even though most of my time is booked, you can probably find me near the press room at odd hours.

Monthly Blog Round-Up – January 2012

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “ On Free Log Management Tools ” is a companion to the checklist below ( updated version ) “ Simple Log Review Checklist Released! ” is often at the top – the checklist is still a very useful tool for many people “ Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2 ”, “ SANS Top 5 Essential Log Reports Update! ” and their predecessor  “Top5 SANS Log Reports Update DRAFT” also show up close to the top. IF YOU WANT TO VOLUNTEER TO FINISH THIS DOCUMENT- PLEASE EMAIL ME! “ On Choosing SIEM ” is about the least wrong way of choosing a SIEM tool – as well as why the right way is so unpopular. My classic PCI DSS log review series is last on my Top 5: “ Complete PCI DSS Log Review Procedures .” In addition, I’d like to draw your attention to a few posts from my Gartner blog : “ Cloud Security Monitoring for IaaS, PaaS, SaaS ” More On Security Monitoring of...