Posts

Showing posts from February, 2013

Monthly Blog Round-Up – January 2013

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “ Simple Log Review Checklist Released! ” is often at the top of this list – the checklist is still a very useful tool for many people. “ On Free Log Management Tools ” is a companion to the checklist ( updated version , and, yes, I know it really needs another update) My classic PCI DSS Log Review series is popular as well. The outlined log review approach is useful for building other types of log review processes and procedures, whether regulatory or not. “ On Choosing SIEM ” is another old classic (from 2010) that shows up on my top list; it covers some tips on  choosing SIEM tools. “ Top 10 Criteria for a SIEM? ” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. “SIEM Bloggables” covers a few high-level SIEM use cases and my view (at the time) of key SIEM functions. In addition, I’d like to draw your attention to a few posts fr...