Monthly Blog Round-Up – November 2014
Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Donn Parker’s “Risks of Risk-Based Security” Summarized” , an old blog post from 2009, somehow made it to my top list this month. A mystery! “ Simple Log Review Checklist Released! ” is often at the top of this list – the checklist is still a very useful tool for many people. “ On Free Log Management Tools ” is a companion to the checklist ( updated version ) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or n...