Posts

Showing posts from August, 2013

Monthly Blog Round-Up – July 2013

Image
Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “ Why No Open Source SIEM, EVER? ” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. “ Simple Log Review Checklist Released! ” is often at the top of this list – the checklist is still a very useful tool for many people. “ On Free Log Management Tools ” is a companion to the checklist ( updated version ) “ Top 10 Criteria for a SIEM? ” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. “ On Choosing SIEM ” is another old classic (from 2010) that often shows up on my top list; it covers some tips on choosing SIEM tools. “SIEM Bloggables” has one possible view on higher-level SIEM use cases and basic functionality, and a quick discussion of SIEM user types (circa 2009) Finally, my classic PCI DSS Log Review series is popular as well. They outlined log review approach, useful for building log r...