Posts

Showing posts from January, 2014

Annual Blog Round-Up – 2013

Here is my annual "Security Warrior" blog round-up of top 10 popular posts/topics in 2013. “ Simple Log Review Checklist Released! ” was again the most popular this year. The checklist, a list of critical things to look for while reviewing  system, network and security logs when responding to a security incident (companion free log tool list ) “ Why No Open Source SIEM, EVER? ” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. PCI DSS Log Review series of posts takes the #3 spot; they are about planning and executing a complete log review process at an organization. “ Top 10 Criteria for a SIEM? ” is an EXAMPLE requirement list for choosing a SIEM tool (it can be used for creating your very own SIEM RFP, but this is much better for it, of course). “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports (the paper link is now restored...