Posts

Showing posts from March, 2012

The Log Book Needs YOUR Help!

Image
As most of you know, I’ve been working on a book about logs, logging and log management for some number of years . At this point, the book is almost done, but the author team is having some minor time commitment issues (aka “less time to write than originally estimated”) ). So, do any of my esteemed blog readers (those adept in the dark arts of log analysis) care to help and write a few chapters here and there, in exchange for (lots of) immortal fame and (admittedly small amount of) cash? Table of contents is here – if you see any chapters you’d like to help with, please let us know. I will post a list of chapters that really need help soon. At this point, we have PLENTY of reviewing help, but we sure can use some writing help!

Monthly Blog Round-Up – February 2012

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “ Simple Log Review Checklist Released! ” is often at the top – the checklist is still a very useful tool for many people “ On Free Log Management Tools ” is a companion to the checklist below ( updated version ) My classic PCI DSS log review series is last on my Top 5: “ Complete PCI DSS Log Review Procedures ”; they are also useful for other compliance or security log review and log monitoring. “ Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2 ”, “ SANS Top 5 Essential Log Reports Update! ” and their predecessor  “Top5 SANS Log Reports Update DRAFT” also show up close to the top. IF YOU WANT TO VOLUNTEER TO FINISH THIS DOCUMENT- PLEASE EMAIL ME! “ On Choosing SIEM ” is about the least wrong way of choosing a SIEM tool – as well as why the right way is so unpopular. In addition, I’d like to draw your attention to a few posts from my Gartner blog...