<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Dr Anton Chuvakin Blog PERSONAL Blog</title><description>This is my PERSONAL blog, as as of August 1, 2011, it focuses on personal matters and various things I find to be fun.</description><managingEditor>noreply@blogger.com (Anton Chuvakin)</managingEditor><pubDate>Mon, 26 Jun 2023 06:51:57 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1689</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://chuvakin.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>(C) Anton Chuvakin and Andrew Hay</copyright><itunes:image href="http://www.chuvakin.org/images/lovelogs.jpg"/><itunes:keywords>logs,log,management,log,analysis,SIEM,SEM,SIM,security,information,security,infosec</itunes:keywords><itunes:summary>LogChat: Andrew Hay and Anton Chuvakin talk about system logging, log management, SIEM and related topics</itunes:summary><itunes:subtitle>LogChat: Andrew Hay and Anton Chuvakin talk about logging, log management and related topics</itunes:subtitle><itunes:category text="Technology"/><itunes:author>Anton Chuvakin</itunes:author><itunes:owner><itunes:email>anton@chuvakin.org</itunes:email><itunes:name>Anton Chuvakin</itunes:name></itunes:owner><item><title>This Blog Is Here For Historical Interest Only!</title><link>http://chuvakin.blogspot.com/2019/07/this-blog-is-here-for-historical.html</link><category>2019</category><category>announcements</category><category>blogging</category><pubDate>Mon, 8 Jul 2019 10:53:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8064203535312669242</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
This is a reminder/disclaimer: &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt; is here for historical interest only. Its history really ended on August 1, 2011 with&amp;nbsp;&lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;this post&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;This blog was my main blogging venue 2005-2011.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;My security blogging in 2011-2019 was at&amp;nbsp;&lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;https://blogs.gartner.com/anton-chuvakin/&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;My 2019+ blogging is centered at&amp;nbsp;&lt;a href="https://medium.com/anton-on-security/"&gt;https://medium.com/anton-on-security/&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Naturally, you already know all this if you &lt;a href="http://www.twitter.com/anton_chuvakin"&gt;follow me on Twitter&lt;/a&gt;&amp;nbsp;...&lt;br /&gt;
&lt;br /&gt;
There you have it!&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – August 2018</title><link>http://chuvakin.blogspot.com/2018/08/monthly-blog-round-up-august-2018.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Fri, 31 Aug 2018 08:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-7619335802808951071</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010 – much ancient!) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and that we &lt;a href="https://blogs.gartner.com/augusto-barros/2018/01/17/security-monitoring-use-cases-the-update/"&gt;updated for 2018&lt;/a&gt;. A lot more &lt;a href="https://blogs.gartner.com/blog/category/all/?c=siem"&gt;SIEM&lt;/a&gt; use case discussion is coming, here is a new post for &lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/20/2018-popular-siem-starter-use-cases/"&gt;2018 SIEM use cases.&lt;/a&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this &lt;em&gt;rapidly&lt;/em&gt; aging checklist is still a useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged quite a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013, &lt;/a&gt;I think these are still very useful in response to “what reports will give me the best insight from my logs?”&lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is still very popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt;&amp;nbsp; – note that this series is even mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 7X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Critical reference posts:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/16/tell-us-about-your-technology-and-more-analyst-briefing-tips/"&gt;“Tell Us About Your Technology” and More Analyst Briefing Tips&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=siem"&gt;SIEM&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/21/next-research-soc-siem-and-again-overall-detection-and-response/"&gt;Next Research: SOC, SIEM, and Again Overall Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/20/2018-popular-siem-starter-use-cases/"&gt;2018 Popular SIEM Starter Use Cases&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/06/what-is-siem-or-can-we-have-a-cyber-defense-platform/"&gt;What Is “SIEM+” Or “Can We Have A Cyber Defense Platform?”&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/06/14/siem-alternatives-what-are-they-do-they-exist/"&gt;SIEM Alternatives? What Are They? Do They Exist?&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/05/2012-redux-what-is-application-security-monitoring/"&gt;2012 Redux: What Is Application Security Monitoring?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on SOC:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/13/soar-native-soc-can-this-work/"&gt;SOAR-native SOC, Can This Work?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/06/26/can-you-do-a-siem-less-soc/"&gt;Can You Do a SIEM-less SOC?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/06/29/hybrid-soc-scenarios/"&gt;Hybrid SOC Scenarios&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/21/next-research-soc-siem-and-again-overall-detection-and-response/"&gt;Next Research: SOC, SIEM, and Again Overall Detection and Response&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/08/24/a-rant-on-single-function-security-tools/"&gt;A Rant on Single Function Security Tools&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/08/22/does-vulnerability-assessment-even-matter/"&gt;Does Vulnerability Assessment Even Matter?&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/25/my-gdpr-inspired-rant-privacy-wtf/"&gt;My GDPR-Inspired Rant: Privacy, WTF!!!&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/22/do-they-have-ai-or-that-rant-on-ai-in-security/"&gt;“Do They Have AI?” or That Rant on AI in Security&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2018/01/annual-blog-round-up-2017.html"&gt;2017&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2018/08/monthly-blog-round-up-july-2018.html"&gt;Monthly Blog Round-Up – July 2018&lt;/a&gt;&lt;/li&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – July 2018</title><link>http://chuvakin.blogspot.com/2018/08/monthly-blog-round-up-july-2018.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Wed, 1 Aug 2018 09:45:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8158028892415337003</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010 – much ancient!) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and that we &lt;a href="https://blogs.gartner.com/augusto-barros/2018/01/17/security-monitoring-use-cases-the-update/"&gt;updated for 2018&lt;/a&gt;. A lot more &lt;a href="https://blogs.gartner.com/blog/category/all/?c=siem"&gt;SIEM&lt;/a&gt; use case discussion is coming, here is a new post for &lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/20/2018-popular-siem-starter-use-cases/"&gt;2018 SIEM use cases.&lt;/a&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this &lt;em&gt;rapidly&lt;/em&gt; aging checklist is still a useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged quite a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013, &lt;/a&gt;I think these are still very useful in response to “what reports will give me the best insight from my logs?”&lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is still very popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt;&amp;nbsp; – note that this series is even mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 7X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Critical reference posts:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/16/tell-us-about-your-technology-and-more-analyst-briefing-tips/"&gt;“Tell Us About Your Technology” and More Analyst Briefing Tips&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=siem"&gt;SIEM&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/21/next-research-soc-siem-and-again-overall-detection-and-response/"&gt;Next Research: SOC, SIEM, and Again Overall Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/20/2018-popular-siem-starter-use-cases/"&gt;2018 Popular SIEM Starter Use Cases&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/06/what-is-siem-or-can-we-have-a-cyber-defense-platform/"&gt;What Is “SIEM+” Or “Can We Have A Cyber Defense Platform?”&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/06/14/siem-alternatives-what-are-they-do-they-exist/"&gt;SIEM Alternatives? What Are They? Do They Exist?&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/07/05/2012-redux-what-is-application-security-monitoring/"&gt;2012 Redux: What Is Application Security Monitoring?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on SOC:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/06/26/can-you-do-a-siem-less-soc/"&gt;Can You Do a SIEM-less SOC?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/06/29/hybrid-soc-scenarios/"&gt;Hybrid SOC Scenarios&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/21/next-research-soc-siem-and-again-overall-detection-and-response/"&gt;Next Research: SOC, SIEM, and Again Overall Detection and Response&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on testing security:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/18/our-threat-testing-and-bas-papers-are-out/"&gt;Our Threat Testing and BAS Papers Are Out!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/23/how-much-of-your-security-gear-is-misconfigured-or-not-configured/"&gt;How Much of Your Security Gear Is Misconfigured or Not Configured?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/29/security-testing-at-what-level/"&gt;Security Testing: At What Level?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/22/on-negative-pressure-or-why-not-objectively-test-security/"&gt;On Negative Pressure or Why NOT Objectively Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/11/the-bane-of-all-security-tests-acting-on-results/"&gt;The Bane of All Security Tests: Acting on Results&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/20/threat-simulation-call-to-action-for-2018/"&gt;Threat Simulation Call to Action for 2018&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/26/new-research-how-to-actually-test-security/"&gt;New Research: How to Actually Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on threat detection “starter kit”&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/30/new-paper-published-how-to-start-your-threat-detection-and-response-practice/"&gt;New Paper Published: “How to Start Your Threat Detection and Response Practice”&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/14/babys-first-threat-assessment/"&gt;Baby’s First Threat Assessment?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/06/the-best-starting-technology-for-detection/"&gt;The Best Starting Technology for Detection?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/08/back-to-basics-indispensable-security-processes-for-detection-and-response/"&gt;Back to Basics: Indispensable Security Processes for Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/new-research-starting-your-detection-and-response-capability/"&gt;New Research: Starting Your Detection and Response Capability&lt;/a&gt;&lt;br&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/25/my-gdpr-inspired-rant-privacy-wtf/"&gt;My GDPR-Inspired Rant: Privacy, WTF!!!&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/22/do-they-have-ai-or-that-rant-on-ai-in-security/"&gt;“Do They Have AI?” or That Rant on AI in Security&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2018/01/annual-blog-round-up-2017.html"&gt;2017&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2018/06/monthly-blog-round-up-may-2018.html"&gt;Monthly Blog Round-Up – May 2018&lt;/a&gt;&lt;/li&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – May 2018</title><link>http://chuvakin.blogspot.com/2018/06/monthly-blog-round-up-may-2018.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Fri, 1 Jun 2018 09:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-607077826121916799</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010 – much ancient!) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and that we &lt;a href="https://blogs.gartner.com/augusto-barros/2018/01/17/security-monitoring-use-cases-the-update/"&gt;UPDATED FOR 2018&lt;/a&gt;.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this &lt;em&gt;rapidly&lt;/em&gt; aging checklist is still a useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged quite a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013, &lt;/a&gt;I think these are still very useful in response to “what reports will give me the best insight from my logs?”&lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt;&amp;nbsp; – note that this series is even mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 7X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Critical reference posts:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/16/tell-us-about-your-technology-and-more-analyst-briefing-tips/"&gt;“Tell Us About Your Technology” and More Analyst Briefing Tips&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on SIEM, SOC, etc&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/21/next-research-soc-siem-and-again-overall-detection-and-response/"&gt;Next Research: SOC, SIEM, and Again Overall Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Just finished research on testing security:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/18/our-threat-testing-and-bas-papers-are-out/"&gt;Our Threat Testing and BAS Papers Are Out!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/23/how-much-of-your-security-gear-is-misconfigured-or-not-configured/"&gt;How Much of Your Security Gear Is Misconfigured or Not Configured?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/29/security-testing-at-what-level/"&gt;Security Testing: At What Level?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/22/on-negative-pressure-or-why-not-objectively-test-security/"&gt;On Negative Pressure or Why NOT Objectively Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/11/the-bane-of-all-security-tests-acting-on-results/"&gt;The Bane of All Security Tests: Acting on Results&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/20/threat-simulation-call-to-action-for-2018/"&gt;Threat Simulation Call to Action for 2018&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/26/new-research-how-to-actually-test-security/"&gt;New Research: How to Actually Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Just finished research on threat detection “starter kit”&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/30/new-paper-published-how-to-start-your-threat-detection-and-response-practice/"&gt;New Paper Published: “How to Start Your Threat Detection and Response Practice”&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/14/babys-first-threat-assessment/"&gt;Baby’s First Threat Assessment?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/06/the-best-starting-technology-for-detection/"&gt;The Best Starting Technology for Detection?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/08/back-to-basics-indispensable-security-processes-for-detection-and-response/"&gt;Back to Basics: Indispensable Security Processes for Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/new-research-starting-your-detection-and-response-capability/"&gt;New Research: Starting Your Detection and Response Capability&lt;/a&gt;&lt;br&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/05/25/my-gdpr-inspired-rant-privacy-wtf/"&gt;My GDPR-Inspired Rant: Privacy, WTF!!!&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/22/do-they-have-ai-or-that-rant-on-ai-in-security/"&gt;“Do They Have AI?” or That Rant on AI in Security&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/04/26/rsa-2018-not-as-messy-as-before/"&gt;RSA 2018: Not As Messy As Before?&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/13/on-wild-security-maturity-overestimation/"&gt;On Wild Security Maturity Overestimation&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2018/01/annual-blog-round-up-2017.html"&gt;2017&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2018/05/monthly-blog-round-up-april-2018.html"&gt;Monthly Blog Round-Up – April 2018&lt;/a&gt;&lt;/li&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – April 2018</title><link>http://chuvakin.blogspot.com/2018/05/monthly-blog-round-up-april-2018.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Tue, 1 May 2018 11:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-3182723202919986768</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and we just &lt;a href="https://blogs.gartner.com/augusto-barros/2018/01/17/security-monitoring-use-cases-the-update/"&gt;UPDATED IT FOR 2018&lt;/a&gt;.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this rapidly aging checklist is still a useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged quite a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013, &lt;/a&gt;I think these are still very useful in response to “what reports will give me the best insight from my logs?”&lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt;&amp;nbsp; – note that this series is even mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 7X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Critical reference posts:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/16/tell-us-about-your-technology-and-more-analyst-briefing-tips/"&gt;“Tell Us About Your Technology” and More Analyst Briefing Tips&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on testing security:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/23/how-much-of-your-security-gear-is-misconfigured-or-not-configured/"&gt;How Much of Your Security Gear Is Misconfigured or Not Configured?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/29/security-testing-at-what-level/"&gt;Security Testing: At What Level?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/22/on-negative-pressure-or-why-not-objectively-test-security/"&gt;On Negative Pressure or Why NOT Objectively Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/11/the-bane-of-all-security-tests-acting-on-results/"&gt;The Bane of All Security Tests: Acting on Results&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/20/threat-simulation-call-to-action-for-2018/"&gt;Threat Simulation Call to Action for 2018&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/26/new-research-how-to-actually-test-security/"&gt;New Research: How to Actually Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on threat detection “starter kit”&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/14/babys-first-threat-assessment/"&gt;Baby’s First Threat Assessment?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/06/the-best-starting-technology-for-detection/"&gt;The Best Starting Technology for Detection?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/08/back-to-basics-indispensable-security-processes-for-detection-and-response/"&gt;Back to Basics: Indispensable Security Processes for Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/new-research-starting-your-detection-and-response-capability/"&gt;New Research: Starting Your Detection and Response Capability&lt;/a&gt;&lt;br&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Just finished research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=soar"&gt;SOAR&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/22/our-security-orchestration-and-automation-soar-paper-publishes/"&gt;Our Security Orchestration and Automation (SOAR) Paper Publishes&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/04/16/soar-webinar-questions-answered/"&gt;SOAR Webinar Questions – Answered&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/03/soar-and-ticketing-friends-frenemies-or-the-same-thing/"&gt;SOAR and Ticketing: Friends, Frenemies or the Same thing?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/20/soar-and-curve-jumping-in-security-operations/"&gt;SOAR and “Curve-jumping” in Security Operations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/06/soar-magic-or-mundane/"&gt;SOAR: Magic or Mundane?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/09/13/soar-research-coming-brace-for-impact/"&gt;SOAR Research Coming … Brace for Impact!!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt; &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/03/22/do-they-have-ai-or-that-rant-on-ai-in-security/"&gt;“Do They Have AI?” or That Rant on AI in Security&lt;/a&gt;&amp;nbsp; &amp;lt;- extra fun&amp;nbsp; because “AI!” :-)&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/04/26/rsa-2018-not-as-messy-as-before/"&gt;RSA 2018: Not As Messy As Before?&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/13/on-wild-security-maturity-overestimation/"&gt;On Wild Security Maturity Overestimation&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2018/01/annual-blog-round-up-2017.html"&gt;2017&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2018/03/monthly-blog-round-up-february-2018.html"&gt;Monthly Blog Round-Up – Feburary 2018&lt;/a&gt;&lt;/li&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – February 2018</title><link>http://chuvakin.blogspot.com/2018/03/monthly-blog-round-up-february-2018.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Thu, 1 Mar 2018 09:19:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-7816344028586355640</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;It is mildly shocking that I’ve been blogging for 13+ years (my &lt;a href="http://chuvakin.blogspot.com/2005/12/my-non-security-blog.html"&gt;first blog post on this blog&lt;/a&gt; was in December 2005, &lt;a href="http://archive.oreilly.com/pub/post/poll_what_do_you_do_with_colle.html"&gt;my old blog&lt;/a&gt; at O’Reilly predates this by about a year), so let’s spend a moment contemplating this fact.&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;br&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&amp;lt;contemplative pause here :-)&amp;gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;br&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and we just &lt;a href="https://blogs.gartner.com/augusto-barros/2018/01/17/security-monitoring-use-cases-the-update/"&gt;UPDATED IT FOR 2018&lt;/a&gt;.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013, &lt;/a&gt;I think these are still very useful in response to “what reports will give me the best insight from my logs?”&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt;&amp;nbsp; – note that this series is even mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this rapidly aging checklist is still a useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged quite a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Critical reference posts:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/16/tell-us-about-your-technology-and-more-analyst-briefing-tips/"&gt;“Tell Us About Your Technology” and More Analyst Briefing Tips&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on testing security:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/23/how-much-of-your-security-gear-is-misconfigured-or-not-configured/"&gt;How Much of Your Security Gear Is Misconfigured or Not Configured?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/29/security-testing-at-what-level/"&gt;Security Testing: At What Level?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/22/on-negative-pressure-or-why-not-objectively-test-security/"&gt;On Negative Pressure or Why NOT Objectively Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/11/the-bane-of-all-security-tests-acting-on-results/"&gt;The Bane of All Security Tests: Acting on Results&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/20/threat-simulation-call-to-action-for-2018/"&gt;Threat Simulation Call to Action for 2018&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/26/new-research-how-to-actually-test-security/"&gt;New Research: How to Actually Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on threat detection “starter kit”&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/08/back-to-basics-indispensable-security-processes-for-detection-and-response/"&gt;Back to Basics: Indispensable Security Processes for Detection and Response&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/new-research-starting-your-detection-and-response-capability/"&gt;New Research: Starting Your Detection and Response Capability&lt;/a&gt;&lt;br&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Just finished research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=soar"&gt;SOAR&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/02/22/our-security-orchestration-and-automation-soar-paper-publishes/"&gt;Our Security Orchestration and Automation (SOAR) Paper Publishes&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/03/soar-and-ticketing-friends-frenemies-or-the-same-thing/"&gt;SOAR and Ticketing: Friends, Frenemies or the Same thing?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/20/soar-and-curve-jumping-in-security-operations/"&gt;SOAR and “Curve-jumping” in Security Operations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/06/soar-magic-or-mundane/"&gt;SOAR: Magic or Mundane?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/09/13/soar-research-coming-brace-for-impact/"&gt;SOAR Research Coming … Brace for Impact!!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt; &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Just finished research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=mssp"&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/30/our-updated-mssp-and-mdr-guidance-publishes/"&gt;Our Updated MSSP and MDR Guidance Publishes&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/14/mssp-isandorvs-mdr/"&gt;MSSP is/and/or/vs MDR?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/17/your-security-operations-maturity-and-your-mssp/"&gt;Your Security Operations Maturity – and Your MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/11/how-to-test-your-msspmdr/"&gt;How To Test Your MSSP/MDR?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/25/the-curse-of-a-black-mssp/"&gt;The Curse of A Black MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/13/on-wild-security-maturity-overestimation/"&gt;On Wild Security Maturity Overestimation&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2018/01/annual-blog-round-up-2017.html"&gt;2017&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2018/02/monthly-blog-round-up-january-2018.html"&gt;Monthly Blog Round-Up – January 2018&lt;/a&gt;&lt;/li&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – January 2018</title><link>http://chuvakin.blogspot.com/2018/02/monthly-blog-round-up-january-2018.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Thu, 1 Feb 2018 13:05:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-3544745274362204406</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and we just &lt;a href="https://blogs.gartner.com/augusto-barros/2018/01/17/security-monitoring-use-cases-the-update/"&gt;UPDATED IT FOR 2018&lt;/a&gt;.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt;&amp;nbsp; – note that this series is even mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this rapildy aging checklist is still a useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged quite a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) s&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013, &lt;/a&gt;I think these are still very useful in response to “what reports will give me the best insight from my logs?”&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;A critical reference post:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on testing security:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/29/security-testing-at-what-level/"&gt;Security Testing: At What Level?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/22/on-negative-pressure-or-why-not-objectively-test-security/"&gt;On Negative Pressure or Why NOT Objectively Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/11/the-bane-of-all-security-tests-acting-on-results/"&gt;The Bane of All Security Tests: Acting on Results&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/20/threat-simulation-call-to-action-for-2018/"&gt;Threat Simulation Call to Action for 2018&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/26/new-research-how-to-actually-test-security/"&gt;New Research: How to Actually Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on threat detection “starter kit”&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/new-research-starting-your-detection-and-response-capability/"&gt;New Research: Starting Your Detection and Response Capability&lt;/a&gt;&lt;br&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=soar"&gt;SOAR&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/03/soar-and-ticketing-friends-frenemies-or-the-same-thing/"&gt;SOAR and Ticketing: Friends, Frenemies or the Same thing?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/20/soar-and-curve-jumping-in-security-operations/"&gt;SOAR and “Curve-jumping” in Security Operations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/06/soar-magic-or-mundane/"&gt;SOAR: Magic or Mundane?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/09/13/soar-research-coming-brace-for-impact/"&gt;SOAR Research Coming … Brace for Impact!!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt; &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Just finished research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=mssp"&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/30/our-updated-mssp-and-mdr-guidance-publishes/"&gt;Our Updated MSSP and MDR Guidance Publishes&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/14/mssp-isandorvs-mdr/"&gt;MSSP is/and/or/vs MDR?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/17/your-security-operations-maturity-and-your-mssp/"&gt;Your Security Operations Maturity – and Your MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/11/how-to-test-your-msspmdr/"&gt;How To Test Your MSSP/MDR?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/25/the-curse-of-a-black-mssp/"&gt;The Curse of A Black MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/13/on-wild-security-maturity-overestimation/"&gt;On Wild Security Maturity Overestimation&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/06/security-analytics-platform-first-or-content-first/"&gt;Security Analytics: Platform First or Content First?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;, 2017.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/11/monthly-blog-round-up-october-2017.html"&gt;Monthly Blog Round-Up – December 2017&lt;/a&gt;&lt;/li&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Annual Blog Round-Up – 2017</title><link>http://chuvakin.blogspot.com/2018/01/annual-blog-round-up-2017.html</link><category>Annual</category><category>blogging</category><category>security</category><pubDate>Wed, 3 Jan 2018 11:11:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8558216376355118582</guid><description>&lt;p&gt;Here is my &lt;strong&gt;annual &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 10 popular posts in 2017. Note that &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my current Gartner blog&lt;/a&gt; is where you go for my recent blogging (&lt;a href="https://blogs.gartner.com/anton-chuvakin/2018/01/02/my-top-7-popular-gartner-blog-posts-for-december-2017/"&gt;example&lt;/a&gt;), all of the content below predates &lt;em&gt;&lt;u&gt;2011&lt;/u&gt;&lt;/em&gt;!&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;!&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)&amp;nbsp; &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always hot! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ in 2017 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (out in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;)&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2009/11/siem-bloggables.html"&gt;“SIEM Bloggables”&lt;/a&gt;&amp;nbsp; is a very old post, more like a mini-paper on&amp;nbsp; some key aspects of &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;, use cases, scenarios, etc as well as 2 types of &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; users. Still very relevant, if not truly modern.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html"&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; consulting firm in 2009-2011 (for my recent work on evaluating &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; tools, see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/18/my-evaluation-criteria-for-security-information-and-event-management-2015-update-publishes/"&gt;this document&lt;/a&gt;)&amp;nbsp; &lt;li&gt;Another old checklist, “&lt;a href="http://chuvakin.blogspot.com/2010/11/log-management-tool-selection-checklist.html"&gt;Log Management Tool Selection Checklist Out!&lt;/a&gt;”&amp;nbsp; holds a top spot&amp;nbsp; – it can be used to compare log management tools during the tool selection process or even formal RFP process. But let me warn you – this is from 2010.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html"&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt;” is about &lt;a href="http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html"&gt;top log reports project of 2008-2013.&lt;/a&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2009/08/myth-of-expert-generalist.html"&gt;“A Myth of An Expert Generalist”&lt;/a&gt; is a fun rant on what I think it means to be “a security expert” today; it argues that &lt;em&gt;you must specialize&lt;/em&gt; within security to really be called an expert. &lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;strong&gt;Total pageviews:&lt;/strong&gt; 33,231 in 2017.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;D&lt;strong&gt;isclaimer&lt;/strong&gt;: all this content was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;.&amp;nbsp; For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – December 2017</title><link>http://chuvakin.blogspot.com/2017/11/monthly-blog-round-up-october-2017.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Wed, 1 Nov 2017 10:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-3053458631546936886</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts based on last&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month’s visitor data&amp;nbsp; (excluding other &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; or &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; round-ups):&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt; – and we are updating it now.&lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this rapildy aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2009/11/siem-bloggables.html"&gt;“SIEM Bloggables”&lt;/a&gt;&amp;nbsp; is a very old post, more like a mini-paper on&amp;nbsp; some key aspects of &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;, use cases, scenarios, etc as well as 2 types of &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; users. Still very relevant, if not truly modern.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="https://blogs.gartner.com/anton-chuvakin/"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;A critical reference post (!):&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/22/important-how-to-impress-annoy-an-analyst-during-a-vendor-briefing-best-worst-tips-here/"&gt;Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Upcoming research on testing security:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/20/threat-simulation-call-to-action-for-2018/"&gt;Threat Simulation Call to Action for 2018&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/26/new-research-how-to-actually-test-security/"&gt;New Research: How to Actually Test Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Upcoming research on threat detection “starter kit”&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/new-research-starting-your-detection-and-response-capability/"&gt;New Research: Starting Your Detection and Response Capability&lt;/a&gt;&lt;br&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=soar"&gt;SOAR&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/03/soar-and-ticketing-friends-frenemies-or-the-same-thing/"&gt;SOAR and Ticketing: Friends, Frenemies or the Same thing?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/20/soar-and-curve-jumping-in-security-operations/"&gt;SOAR and “Curve-jumping” in Security Operations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/06/soar-magic-or-mundane/"&gt;SOAR: Magic or Mundane?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/09/13/soar-research-coming-brace-for-impact/"&gt;SOAR Research Coming … Brace for Impact!!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt; &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="https://blogs.gartner.com/blog/category/all/?c=mssp"&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/14/mssp-isandorvs-mdr/"&gt;MSSP is/and/or/vs MDR?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/17/your-security-operations-maturity-and-your-mssp/"&gt;Your Security Operations Maturity – and Your MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/10/11/how-to-test-your-msspmdr/"&gt;How To Test Your MSSP/MDR?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/25/the-curse-of-a-black-mssp/"&gt;The Curse of A Black MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/12/28/all-my-research-published-in-2017/"&gt;All My Research Published in 2017&lt;/a&gt;&lt;li&gt;&lt;a href="https://blogs.gartner.com/anton-chuvakin/2017/11/13/on-wild-security-maturity-overestimation/"&gt;On Wild Security Maturity Overestimation&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/06/security-analytics-platform-first-or-content-first/"&gt;Security Analytics: Platform First or Content First?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Other posts in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – September 2017</title><link>http://chuvakin.blogspot.com/2017/10/monthly-blog-round-up-september-2017.html</link><pubDate>Mon, 2 Oct 2017 08:13:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5557946223926634936</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month:&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a  whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases  described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;  product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use  cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;.&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;/li&gt;&lt;ol&gt; &lt;/ol&gt;&lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2009/11/siem-bloggables.html"&gt;“SIEM Bloggables”&lt;/a&gt;&amp;nbsp; is a very old post , more like a mini-paper on&amp;nbsp; some key aspects of &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;, use cases, scenarios, etc as well as 2 types of &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; users.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="http://blogs.gartner.com/blog/category/all/?c=siem"&gt;SIEM&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/08/14/lets-define-siem/"&gt;Let’s Define “SIEM”!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/08/07/is-siem-the-best-threat-detection-technology-ever/"&gt;Is SIEM The Best Threat Detection Technology, Ever?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/26/siem-or-log-management/"&gt;SIEM or Log Management?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/19/action-item-saas-siem-users-sought/"&gt;Action Item: SaaS SIEM Users Sought!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/17/flashback-2014-siem-deployment-blueprint-visual/"&gt;Flashback 2014: SIEM Deployment Blueprint Visual&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/11/summer-of-siem-2017-coming/"&gt;Summer of SIEM 2017 Coming…&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Planned research on SOAR (security orchestration,&amp;nbsp; automation and response):&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/13/soar-research-coming-brace-for-impact/"&gt;SOAR Research Coming … Brace for Impact!!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Planned research on MSSP:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/25/the-curse-of-a-black-mssp/"&gt;The Curse of A Black MSSP&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/09/06/security-analytics-platform-first-or-content-first/"&gt;Security Analytics: Platform First or Content First?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/19/excellent-paper-the-evolving-effectiveness-of-endpoint-protection-solutions/"&gt;Excellent Paper: “The Evolving Effectiveness of Endpoint Protection Solutions”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/09/monthly-blog-round-up-august-2017.html"&gt;Monthly Blog Round-Up – August 2017&lt;/a&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – August 2017</title><link>http://chuvakin.blogspot.com/2017/09/monthly-blog-round-up-august-2017.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Fri, 1 Sep 2017 08:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-7309873173284530522</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month:&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;/li&gt;&lt;ol&gt;&lt;!--StartFragment--&gt;
&lt;/ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New 
SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a 
whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases 
described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; 
product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; 
&lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in 
depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; 
for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; 
use cases. Finally, see our 2016 research on developing security monitoring use 
cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on &lt;a href="http://blogs.gartner.com/blog/category/all/?c=siem"&gt;SIEM&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/08/14/lets-define-siem/"&gt;Let’s Define “SIEM”!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/08/07/is-siem-the-best-threat-detection-technology-ever/"&gt;Is SIEM The Best Threat Detection Technology, Ever?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/26/siem-or-log-management/"&gt;SIEM or Log Management?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/19/action-item-saas-siem-users-sought/"&gt;Action Item: SaaS SIEM Users Sought!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/17/flashback-2014-siem-deployment-blueprint-visual/"&gt;Flashback 2014: SIEM Deployment Blueprint Visual&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/11/summer-of-siem-2017-coming/"&gt;Summer of SIEM 2017 Coming…&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/19/excellent-paper-the-evolving-effectiveness-of-endpoint-protection-solutions/"&gt;Excellent Paper: “The Evolving Effectiveness of Endpoint Protection Solutions”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/08/monthly-blog-round-up-july-2017.html"&gt;Monthly Blog Round-Up – July 2017&lt;/a&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – July 2017</title><link>http://chuvakin.blogspot.com/2017/08/monthly-blog-round-up-july-2017.html</link><pubDate>Tue, 1 Aug 2017 12:41:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-6886551121664933673</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month:&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;Again, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on SIEM:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/26/siem-or-log-management/"&gt;SIEM or Log Management?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/19/action-item-saas-siem-users-sought/"&gt;Action Item: SaaS SIEM Users Sought!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/17/flashback-2014-siem-deployment-blueprint-visual/"&gt;Flashback 2014: SIEM Deployment Blueprint Visual&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/07/11/summer-of-siem-2017-coming/"&gt;Summer of SIEM 2017 Coming…&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on vulnerability management:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/05/18/wannacry-or-useful-reminders-of-the-realities-of-vulnerability-management/"&gt;WannaCry or Useful Reminders of the Realities of Vulnerability Management&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/19/cloud-threat-detection-research/"&gt;Cloud Threat Detection Research&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/19/excellent-paper-the-evolving-effectiveness-of-endpoint-protection-solutions/"&gt;Excellent Paper: “The Evolving Effectiveness of Endpoint Protection Solutions”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/07/monthly-blog-round-up-june-2017.html"&gt;Monthly Blog Round-Up – June 2017&lt;/a&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – June 2017</title><link>http://chuvakin.blogspot.com/2017/07/monthly-blog-round-up-june-2017.html</link><pubDate>Fri, 7 Jul 2017 11:35:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5109981664962653925</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month:&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;This month, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;br&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on vulnerability management:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/05/18/wannacry-or-useful-reminders-of-the-realities-of-vulnerability-management/"&gt;WannaCry or Useful Reminders of the Realities of Vulnerability Management&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/19/cloud-threat-detection-research/"&gt;Cloud Threat Detection Research&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/11/why-your-security-data-lake-project-will-fail/"&gt;Why Your Security Data Lake Project Will FAIL!&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/06/upcoming-webinar-user-and-entity-behavior-analytics-tools/"&gt;Upcoming Webinar: User and Entity Behavior Analytics Tools&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/03/31/our-security-analytics-and-ueba-papers-published/"&gt;Our Security Analytics and UEBA Papers Published&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/24/ok-so-who-really-must-get-a-ueba/"&gt;Ok, So Who Really MUST Get a UEBA?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/05/on-ueba-uba-use-cases/"&gt;On UEBA / UBA Use Cases&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/12/ueba-clearly-defined-again/"&gt;UEBA Clearly Defined, Again?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/08/what-should-your-ueba-show-indications-or-conclusions/"&gt;What Should Your UEBA Show: Indications or Conclusions?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/29/security-without-security-people-a-sad-way-forward/"&gt;Security Without Security People: A [Sad] Way Forward?&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/19/excellent-paper-the-evolving-effectiveness-of-endpoint-protection-solutions/"&gt;Excellent Paper: “The Evolving Effectiveness of Endpoint Protection Solutions”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/06/07/puzzled-of-hackback/"&gt;Befuddled By “Hackback”&lt;/a&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/06/monthly-blog-round-up-may-2017.html"&gt;Monthly Blog Round-Up – May 2017&lt;/a&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – May 2017</title><link>http://chuvakin.blogspot.com/2017/06/monthly-blog-round-up-may-2017.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Thu, 1 Jun 2017 09:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-1268444558412998488</guid><description>&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;month:&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;This month, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has more than 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;br&gt;&lt;/div&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;EPIC WIN post:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/11/why-your-security-data-lake-project-will-fail/"&gt;Why Your Security Data Lake Project Will FAIL!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on vulnerability management:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/05/18/wannacry-or-useful-reminders-of-the-realities-of-vulnerability-management/"&gt;WannaCry or Useful Reminders of the Realities of Vulnerability Management&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/19/cloud-threat-detection-research/"&gt;Cloud Threat Detection Research&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt;&lt;ul dir="ltr"&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/03/31/our-security-analytics-and-ueba-papers-published/"&gt;Our Security Analytics and UEBA Papers Published&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/24/ok-so-who-really-must-get-a-ueba/"&gt;Ok, So Who Really MUST Get a UEBA?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/05/on-ueba-uba-use-cases/"&gt;On UEBA / UBA Use Cases&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/12/ueba-clearly-defined-again/"&gt;UEBA Clearly Defined, Again?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/08/what-should-your-ueba-show-indications-or-conclusions/"&gt;What Should Your UEBA Show: Indications or Conclusions?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: left;" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;&amp;nbsp; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/05/monthly-blog-round-up-april-2017.html"&gt;Monthly Blog Round-Up – April 2017&lt;/a&gt;&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – April 2017</title><link>http://chuvakin.blogspot.com/2017/05/monthly-blog-round-up-april-2017.html</link><category>blo</category><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Fri, 12 May 2017 17:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5379172189776071170</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;This month, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;  &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/19/cloud-threat-detection-research/"&gt;Cloud Threat Detection Research&lt;/a&gt;&lt;/div&gt;&lt;/li&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/25/more-cloud-security-monitoring-contemplations/"&gt;More Cloud Security Monitoring Contemplations&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/03/31/our-security-analytics-and-ueba-papers-published/"&gt;Our Security Analytics and UEBA Papers Published&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/24/ok-so-who-really-must-get-a-ueba/"&gt;Ok, So Who Really MUST Get a UEBA?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/05/on-ueba-uba-use-cases/"&gt;On UEBA / UBA Use Cases&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/12/ueba-clearly-defined-again/"&gt;UEBA Clearly Defined, Again?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/08/what-should-your-ueba-show-indications-or-conclusions/"&gt;What Should Your UEBA Show: Indications or Conclusions?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;EPIC WIN post:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/11/why-your-security-data-lake-project-will-fail/"&gt;Why Your Security Data Lake Project Will FAIL!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/04/07/siem-future-a-ueba-path-or-an-mdr-way/"&gt;SIEM Future: A UEBA Path or An MDR Way?&lt;/a&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/27/security-in-2025-extrapolate-or-bust/"&gt;Security in 2025 – Extrapolate or Bust?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/03/monthly-blog-round-up-feburary-2016.html"&gt;Monthly Blog Round-Up – Februrary 2017&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – February 2017</title><link>http://chuvakin.blogspot.com/2017/03/monthly-blog-round-up-feburary-2016.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Wed, 1 Mar 2017 08:15:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-1830133522073037566</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010, so I have no idea why it tops the charts now!) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;!  &lt;/li&gt;
&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;/li&gt;
&lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;/li&gt;
&lt;li&gt;This month, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com/"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;/div&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;strong&gt;Recent research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt;
&lt;ul dir="ltr"&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/24/ok-so-who-really-must-get-a-ueba/"&gt;Ok, So Who Really MUST Get a UEBA?&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/05/on-ueba-uba-use-cases/"&gt;On UEBA / UBA Use Cases&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/12/ueba-clearly-defined-again/"&gt;UEBA Clearly Defined, Again?&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/08/what-should-your-ueba-show-indications-or-conclusions/"&gt;What Should Your UEBA Show: Indications or Conclusions?&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;/div&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/27/security-in-2025-extrapolate-or-bust/"&gt;Security in 2025 – Extrapolate or Bust?&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/22/all-my-research-published-in-2016/"&gt;All My Research Published in 2016&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection vs prevention)  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br /&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;. &lt;br /&gt;
&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/02/monthly-blog-round-up-january-2017.html"&gt;Monthly Blog Round-Up – January 2017&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – January 2017</title><link>http://chuvakin.blogspot.com/2017/02/monthly-blog-round-up-january-2017.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Wed, 1 Feb 2017 05:11:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-6794809279693855477</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;This month, my classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is extra popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ even though it predates it), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) – note that this series is mentioned in &lt;a href="https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf"&gt;some PCI Council materials.&lt;/a&gt; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;!  &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html"&gt;“An Open Letter to Android or “Android, You Are Shit!””&lt;/a&gt; is an epic rant about my six year long (so far) relationship with Android mobile devices (no spoilers here – go and &lt;a href="http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html"&gt;read it&lt;/a&gt;). &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/24/ok-so-who-really-must-get-a-ueba/"&gt;Ok, So Who Really MUST Get a UEBA?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/05/on-ueba-uba-use-cases/"&gt;On UEBA / UBA Use Cases&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/12/ueba-clearly-defined-again/"&gt;UEBA Clearly Defined, Again?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/08/what-should-your-ueba-show-indications-or-conclusions/"&gt;What Should Your UEBA Show: Indications or Conclusions?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on deception:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/21/our-applying-deception-technologies-and-techniques-to-improve-threat-detection-and-response-paper-is-published/"&gt;Our “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” Paper is Published&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/19/apt-ready-better-threats-detection-vs-detecitng-better-threats/"&gt;APT-Ready? Better Threat Detection vs Detecting “Better” Threats?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/04/better-data-or-better-algorithms/"&gt;Better Data or Better Algorithms?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/23/tricky-building-a-business-case-for-a-deception-tool/"&gt;Tricky: Building a Business Case for A Deception Tool?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/16/it-is-happening-we-are-starting-our-deception-research/"&gt;It Is Happening: We Are Starting Our Deception Research!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2017/01/27/security-in-2025-extrapolate-or-bust/"&gt;Security in 2025 – Extrapolate or Bust?&lt;/a&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/22/all-my-research-published-in-2016/"&gt;All My Research Published in 2016&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection vs prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html"&gt;2016&lt;/a&gt;. &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2017/01/monthly-blog-round-up-december-2016.html"&gt;Monthly Blog Round-Up – December 2016&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Annual Blog Round-Up – 2016</title><link>http://chuvakin.blogspot.com/2017/01/annual-blog-round-up-2016.html</link><category>Annual</category><category>blogging</category><category>security</category><pubDate>Wed, 4 Jan 2017 11:11:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-7191067333689361071</guid><description>&lt;p&gt;Here is my &lt;strong&gt;annual &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 10 popular posts/topics in 2016. Note that &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my current Gartner blog&lt;/a&gt; is where you go for my recent blogging, all of the content below predates 2011.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;!&lt;/li&gt; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always hot! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ in 2017 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (out in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;)&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; project (well, a program, really) costs at an organization (a lot more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;).  &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html"&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; consulting firm in 2009-2011 (for my recent work on evaluating &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; tools, see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/18/my-evaluation-criteria-for-security-information-and-event-management-2015-update-publishes/"&gt;this document&lt;/a&gt;)  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/11/how-to-write-ok-siem-rfp.html"&gt;“How to Write an OK SIEM RFP?”&lt;/a&gt; (from 2010) contains Anton’s &lt;em&gt;least hated&lt;/em&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; RFP writing tips (I don’t have any favorite tips since I hate the RFP process)  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html"&gt;“An Open Letter to Android or “Android, You Are Shit!””&lt;/a&gt; is an epic rant about my six year long (so far) relationship with Android mobile devices (no spoilers here – go and &lt;a href="http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html"&gt;read it&lt;/a&gt;).  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2009/08/myth-of-expert-generalist.html"&gt;“A Myth of An Expert Generalist”&lt;/a&gt; is a fun rant on what I think it means to be “a security expert” today; it argues that &lt;em&gt;you must specialize&lt;/em&gt; within security to really be called an expert. &lt;li&gt;Another old checklist, “&lt;a href="http://chuvakin.blogspot.com/2010/11/log-management-tool-selection-checklist.html"&gt;Log Management Tool Selection Checklist Out!&lt;/a&gt;”&amp;nbsp; holds a top spot&amp;nbsp; – it can be used to compare log management tools during the tool selection process or even formal RFP process. But let me warn you – this is from 2010.&lt;/li&gt;&lt;/ol&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: all this content was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;.&amp;nbsp; For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – December 2016</title><link>http://chuvakin.blogspot.com/2017/01/monthly-blog-round-up-december-2016.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Tue, 3 Jan 2017 07:46:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5569028992840692958</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html"&gt;“An Open Letter to Android or “Android, You Are Shit!””&lt;/a&gt; is an epic rant about my six year long (so far) relationship with Android mobile devices (no spoilers here – go and &lt;a href="http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html"&gt;read it&lt;/a&gt;). &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;)&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/12/ueba-clearly-defined-again/"&gt;UEBA Clearly Defined, Again?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/08/what-should-your-ueba-show-indications-or-conclusions/"&gt;What Should Your UEBA Show: Indications or Conclusions?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on deception:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/21/our-applying-deception-technologies-and-techniques-to-improve-threat-detection-and-response-paper-is-published/"&gt;Our “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” Paper is Published&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/19/apt-ready-better-threats-detection-vs-detecitng-better-threats/"&gt;APT-Ready? Better Threat Detection vs Detecting “Better” Threats?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/04/better-data-or-better-algorithms/"&gt;Better Data or Better Algorithms?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/23/tricky-building-a-business-case-for-a-deception-tool/"&gt;Tricky: Building a Business Case for A Deception Tool?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/16/it-is-happening-we-are-starting-our-deception-research/"&gt;It Is Happening: We Are Starting Our Deception Research!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/12/22/all-my-research-published-in-2016/"&gt;All My Research Published in 2016&lt;/a&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection vs prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on August 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/12/monthly-blog-round-up-november-2016.html"&gt;Monthly Blog Round-Up – November 2016&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>An Open Letter to Android or “Android, You Are Shit!”</title><link>http://chuvakin.blogspot.com/2016/12/an-open-letter-to-android-or-android.html</link><category>Android</category><category>mobile</category><category>musings</category><pubDate>Thu, 29 Dec 2016 12:09:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4015247598919185925</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Dear Android:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;I know you are an operating system and probably cannot (yet?) read on your own. However, recent events compelled me to write this letter to you; an idea for it literally came to me in a dream.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;You see, I have carried an Android phone in my pocket since 2010, for almost six years. First &lt;i&gt;Sony Experia X10&lt;/i&gt; (eventually running a venerable Android 2.3.7), then another phone and then finally a &lt;i&gt;Google Nexus 4&lt;/i&gt; and now &lt;i&gt;Google Nexus 5X &lt;/i&gt;(sporting Android 7.1.1). At some point, I traded an iPad for a &lt;i&gt;Google Nexus 9&lt;/i&gt;. A [sort of] Android Amazon Fire is my living room Android. I have convinced my wife to start using Android as well and she became a fan too. This represents a multi-year love affair with you, dear Android.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;In fact, dear Android, I often had to defend you from packs from rabid Apple fanboys, generally with good results - I either won or we had a draw. Over the years, I had to defend my mobile technology choices from many people: “No, it is NOT an iPhone, it is a Nexus”, “Yes, I chose Android because I like it more than iPhone, not because it is cheaper”, “Yes, I think Google Now is way more useful than Siri”, etc, etc. I’ve counter-attacked with arguments about “closed Apple ecosystem”, “one stupid button” and “overpriced devices.” &amp;nbsp; As a person who follows information technology, I am aware of Android many strengths such as better background processes and multi-tasking, security improvements, flexible user interface, Google Now integration, etc.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;However, as I am writing this, my beloved Nexus 5X is no longer with me. In fact, recent events have triggered some soul-searching and ultimately this letter. While doing my soul-searching, I realized that my love affair with you, Android, has some strong dysfunctional notes. You see, I think I always suspected that you are shit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Over the years, I’ve been using my Android devices carefully and thoughtfully – I never rooted them, never sideloaded apps [well, not to my main personal phone], and I even tried to minimize my use of non-Google applications, etc. &amp;nbsp;However, as I recall my experiences with Android over the last six years, I am saddened to report that you, Android, never really worked quite right.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;In fact, I distilled my reasons to calling you “shit” to one key point: &lt;b&gt;I have never really trusted you, because you have never worked reliably enough to earn such trust.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Indeed, my Sony phone will sometimes crash and reboot, or freeze (“battery out” was the only cure). I of course explained it by “growing pains of Android, the new mobile OS”…after all you were just in v.2., practically a baby. My Nexus 4 used to crash and shut down as well; apps will often drain the battery to zero without any warning. &amp;nbsp;Furthermore, even nowadays, my Google Nexus 9 tablet (running Android 7.1.1) will occasionally just shut down out of the blue – I just had to restart it earlier today. &amp;nbsp;A few days before my Nexus 5X untimely death - just 1 year and 9 days after purchase, the phone rebooted when I launched a Camera app. Such random reboots and crashes were not common with my Nexus 5X, but they did happen periodically. &amp;nbsp;And then finally, my Nexus 5X entered an endless reboot loop a few days after the 7.1.1 OTA update and now has to be replaced. No troubleshooting steps helped.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;OK, Google, you want to blame the hardware, perhaps? My experiences over the last 6 years sap the energy from this argument. I used the hardware from 3 different makers, all running Android, all having stability problems.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;You see, Android, I don’t care about improved malware protection, faster UI and about the fact that you are “really Linux.” I don’t care about your growing market share. &amp;nbsp;An OS that cannot stay up is shit OS. And, you, my dear OS friend, is shit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;In fact, as my employer gave me an iPhone (first 4S and now 5S), a peculiar pattern of behavior developed in my life: if I absolutely, positively had to call an Uber on a dark and stormy night, I will stash my work iPhone in my back pocket, just in case. If I have to show a boarding pass to a permanently angry TSA agent, I will print it or use an iPhone. In fact, I was not even aware of this &lt;i&gt;“if it has to happen – use iPhone”&lt;/i&gt; pattern until my wife asked me about why I was printing another boarding pass and I said “Ok, I guess I can use an iPhone for that” – and so I realized that I just won’t trust my Android device with this.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Dear Android, you may be a full-featured OS now, but you are just not mission critical. In fact, you are the opposite of that – you are iffy. And the only reason for why a version SEVEN (not version TWO with growing pains, mind you) will not achieve this reliability is obvious to me – you are shit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Android, I’ve never really trusted you and I don’t trust you now. I’ve lived with you since your version 2.1 to a current 7.1.1. The only way you can still have "growing pains" after so many years is that you are a shit OS.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Despite all that, dear Android, I will take one more chance with you. When my Google Nexus 5X is repaired and then hopefully continues working for a while, I will stick to using you. But, sorry, no promises beyond that point!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Respectfully ... but distrustfully,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;Dr. Anton Chuvakin&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;span style="color: #222222; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 13.3333px;"&gt;(as a consumer, NOT as a technology analyst!)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – November 2016</title><link>http://chuvakin.blogspot.com/2016/12/monthly-blog-round-up-november-2016.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Thu, 1 Dec 2016 09:50:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-6689056103689420445</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on developing security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;!  &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” (also aged a bit by now) is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;)  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this &lt;a href="http://www.gartner.com/document/3198817"&gt;here in this paper&lt;/a&gt;). &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on security analytics and UBA / UEBA:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/14/ueba-shines-where-siem-whines/"&gt;UEBA Shines Where SIEM Whines?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/07/the-coming-uba-ueba-siem-war/"&gt;The Coming UBA / UEBA – SIEM War!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on deception:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/11/21/our-applying-deception-technologies-and-techniques-to-improve-threat-detection-and-response-paper-is-published/"&gt;Our “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” Paper is Published&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/19/apt-ready-better-threats-detection-vs-detecitng-better-threats/"&gt;APT-Ready? Better Threat Detection vs Detecting “Better” Threats?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/04/better-data-or-better-algorithms/"&gt;Better Data or Better Algorithms?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/23/tricky-building-a-business-case-for-a-deception-tool/"&gt;Tricky: Building a Business Case for A Deception Tool?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/16/it-is-happening-we-are-starting-our-deception-research/"&gt;It Is Happening: We Are Starting Our Deception Research!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Past research on SOC:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/28/soc-webinar-questions-answered/"&gt;SOC Webinar Questions Answered&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/25/our-how-to-plan-design-operate-and-evolve-a-soc-papper-is-published/"&gt;Our “How to Plan, Design, Operate and Evolve a SOC” Paper Is Published&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/07/about-the-tri-team-model-of-soc-cirt-threat-something/"&gt;About The Tri-Team Model of SOC, CIRT, “Threat Something”&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/11/new-research-starting-soon-threat-intel-soc-etc/"&gt;New Research Starting Soon: Threat Intel, SOC, etc&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/04/your-soc-nuclear-triad/"&gt;Your SOC Nuclear Triad&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection vs prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/11/monthly-blog-round-up-october-2016.html"&gt;Monthly Blog Round-Up – October 2016&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – October 2016</title><link>http://chuvakin.blogspot.com/2016/11/monthly-blog-round-up-october-2016.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Tue, 1 Nov 2016 07:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4963106836960211562</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this &lt;a href="http://www.gartner.com/document/3198817"&gt;here in this paper&lt;/a&gt;).  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Upcoming research on security analytics:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/27/next-research-back-to-security-analytics-and-ubaueba/"&gt;Next Research: Back to Security Analytics and UBA/UEBA&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Currect research on deception:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/19/apt-ready-better-threats-detection-vs-detecitng-better-threats/"&gt;APT-Ready? Better Threat Detection vs Detecting “Better” Threats?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/04/better-data-or-better-algorithms/"&gt;Better Data or Better Algorithms?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/23/tricky-building-a-business-case-for-a-deception-tool/"&gt;Tricky: Building a Business Case for A Deception Tool?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/16/it-is-happening-we-are-starting-our-deception-research/"&gt;It Is Happening: We Are Starting Our Deception Research!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on SOC:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/10/25/our-how-to-plan-design-operate-and-evolve-a-soc-papper-is-published/"&gt;Our “How to Plan, Design, Operate and Evolve a SOC” Paper Is Published&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/07/about-the-tri-team-model-of-soc-cirt-threat-something/"&gt;About The Tri-Team Model of SOC, CIRT, “Threat Something”&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/11/new-research-starting-soon-threat-intel-soc-etc/"&gt;New Research Starting Soon: Threat Intel, SOC, etc&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/04/your-soc-nuclear-triad/"&gt;Your SOC Nuclear Triad&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection vs prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/06/jumping-security-maturity-fail/"&gt;Jumping Security Maturity FAIL!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/10/monthly-blog-round-up-september-2016.html"&gt;Monthly Blog Round-Up – September 2016&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – September 2016</title><link>http://chuvakin.blogspot.com/2016/10/monthly-blog-round-up-september-2016.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Mon, 3 Oct 2016 07:51:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8132424762827300380</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;!  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this &lt;a href="http://www.gartner.com/document/3198817"&gt;here in this paper&lt;/a&gt;).  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;)  &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Currect research on deception:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/23/tricky-building-a-business-case-for-a-deception-tool/"&gt;Tricky: Building a Business Case for A Deception Tool?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/09/16/it-is-happening-we-are-starting-our-deception-research/"&gt;It Is Happening: We Are Starting Our Deception Research!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on SOC:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/07/about-the-tri-team-model-of-soc-cirt-threat-something/"&gt;About The Tri-Team Model of SOC, CIRT, “Threat Something”&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/11/new-research-starting-soon-threat-intel-soc-etc/"&gt;New Research Starting Soon: Threat Intel, SOC, etc&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/04/your-soc-nuclear-triad/"&gt;Your SOC Nuclear Triad&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Recent research on threat intelligence:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/24/how-to-grow-to-strategic-threat-intel-consumption/"&gt;How to Grow to Strategic Threat Intel Consumption?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/06/28/babys-first-threat-intel-usage-questions/"&gt;Baby’s First Threat Intel Usage Questions&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/16/how-a-lower-maturity-security-organization-can-use-threat-intel/"&gt;How a Lower Maturity Security Organization Can Use Threat Intel?&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/21/antons-favorite-threat-hunting-links/"&gt;Anton’s Favorite Threat Hunting Links&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection and prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/06/jumping-security-maturity-fail/"&gt;Jumping Security Maturity FAIL!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/09/monthly-blog-round-up-august-2016.html"&gt;Monthly Blog Round-Up – August 2016&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – August 2016</title><link>http://chuvakin.blogspot.com/2016/09/monthly-blog-round-up-august-2016.html</link><category>blogging</category><category>Monthly</category><category>security</category><pubDate>Thu, 1 Sep 2016 05:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5287960946783050158</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;)  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (now in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;) &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the costs of a SIEM project (well, a program, really) at an organization (much more details on this &lt;a href="http://www.gartner.com/document/3198817"&gt;here in this paper&lt;/a&gt;). &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on SOC:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/07/about-the-tri-team-model-of-soc-cirt-threat-something/"&gt;About The Tri-Team Model of SOC, CIRT, “Threat Something”&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/11/new-research-starting-soon-threat-intel-soc-etc/"&gt;New Research Starting Soon: Threat Intel, SOC, etc&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/04/your-soc-nuclear-triad/"&gt;Your SOC Nuclear Triad&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on threat intelligence:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/24/how-to-grow-to-strategic-threat-intel-consumption/"&gt;How to Grow to Strategic Threat Intel Consumption?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/06/28/babys-first-threat-intel-usage-questions/"&gt;Baby’s First Threat Intel Usage Questions&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/16/how-a-lower-maturity-security-organization-can-use-threat-intel/"&gt;How a Lower Maturity Security Organization Can Use Threat Intel?&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/08/09/threats-inside-vs-insider-threat/"&gt;Threats Inside vs Insider Threat&lt;/a&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/21/antons-favorite-threat-hunting-links/"&gt;Anton’s Favorite Threat Hunting Links&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection and prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/06/jumping-security-maturity-fail/"&gt;Jumping Security Maturity FAIL!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/07/24/on-tanks-vs-tractors/"&gt;On Tanks vs Tractors&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/08/monthly-blog-round-up-july-2016.html"&gt;Monthly Blog Round-Up – July 2016&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item><item><title>Monthly Blog Round-Up – July 2016</title><link>http://chuvakin.blogspot.com/2016/08/monthly-blog-round-up-july-2016.html</link><pubDate>Mon, 1 Aug 2016 09:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-2143256986875237481</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;Here is my next &lt;strong&gt;&lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; &lt;a href="http://chuvakin.blogspot.com/"&gt;"Security Warrior" blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt; &lt;ol&gt; &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html"&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? You be the judge.&amp;nbsp; Succeeding with &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt;” …&amp;nbsp; &lt;i&gt;[235 pageviews]&lt;/i&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html"&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases described in depth with rules and reports [using now-defunct &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; product]; also see &lt;a href="http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/"&gt;this&lt;/a&gt; &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use case in depth and &lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/"&gt;this&lt;/a&gt; for a more current list of popular &lt;a href="http://blogs.gartner.com/anton-chuvakin/tag/SIEM/"&gt;SIEM&lt;/a&gt; use cases. Finally, see our 2016 research on security monitoring use cases &lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/17/our-new-paper-on-security-monitoring-use-cases-publishes/"&gt;here&lt;/a&gt;! &lt;i&gt;[156 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a href="http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html"&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – this aging checklist is still a very useful tool for many people. “&lt;a href="http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html"&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a href="http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html"&gt;updated version&lt;/a&gt;) &lt;em&gt;[56 pageviews]&lt;/em&gt;  &lt;li&gt;My classic &lt;a href="http://chuvakin.blogspot.com/search/label/PCI_Log_Review"&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3+ as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a href="http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359"&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a href="http://www.pcicompliancebook.info/"&gt;our PCI book&lt;/a&gt; (out in &lt;a href="http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/"&gt;its 4th edition!&lt;/a&gt;)&lt;i&gt;[40+ pageviews to the main tag]&lt;/i&gt;  &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html"&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a href="http://www.gartner.com/document/2845417"&gt;here in this paper&lt;/a&gt;). &lt;em&gt;[70 pageviews of total 2891 pageviews to all blog page]&lt;/em&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;my Gartner blog&lt;/a&gt; [which, BTW, now has about 5X of the traffic of &lt;a href="http://chuvakin.blogspot.com"&gt;this blog&lt;/a&gt;]:&amp;nbsp; &lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Current research on SOC and threat intelligence [2 projects]:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir="ltr"&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/07/about-the-tri-team-model-of-soc-cirt-threat-something/"&gt;About The Tri-Team Model of SOC, CIRT, “Threat Something”&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/06/28/babys-first-threat-intel-usage-questions/"&gt;Baby’s First Threat Intel Usage Questions&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/16/how-a-lower-maturity-security-organization-can-use-threat-intel/"&gt;How a Lower Maturity Security Organization Can Use Threat Intel?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/05/11/new-research-starting-soon-threat-intel-soc-etc/"&gt;New Research Starting Soon: Threat Intel, SOC, etc&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style="text-align: left" trbidi="on"&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/08/04/your-soc-nuclear-triad/"&gt;Your SOC Nuclear Triad&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/07/21/can-i-detect-advanced-threats-with-just-flowsipfix/"&gt;Can I Detect Advanced Threats With Just Flows/IPFIX?&lt;/a&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/31/sad-hilarity-of-predictive-analytics-in-security/"&gt;Sad Hilarity of Predictive Analytics in Security?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/03/21/antons-favorite-threat-hunting-links/"&gt;Anton’s Favorite Threat Hunting Links&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/02/19/my-detection-confidence-survey-results/"&gt;My Detection Confidence Survey Results&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/25/no-virginia-it-does-not-mean-that/"&gt;No, Virginia, It Does NOT Mean That!&lt;/a&gt; (detection and prevention)  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/08/deception-as-detection-or-give-deception-a-chance/"&gt;“Deception as Detection” or Give Deception a Chance?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2016/01/06/jumping-security-maturity-fail/"&gt;Jumping Security Maturity FAIL!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/09/11/security-automate-andor-die/"&gt;Security: Automate And/Or Die?&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/07/24/on-tanks-vs-tractors/"&gt;On Tanks vs Tractors&lt;/a&gt; &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/"&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a href="http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/"&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a href="http://www.gartner.com/AnalystBiography?authorId=40636"&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt; and &lt;a href="http://chuvakin.blogspot.com/search/label/Annual"&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a href="http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html"&gt;2007&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html"&gt;2008&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html"&gt;2009&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html"&gt;2010&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html"&gt;2011&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html"&gt;2012&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html"&gt;2013&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html"&gt;2014&lt;/a&gt;, &lt;a href="http://chuvakin.blogspot.com/2016/01/annual-blog-round-up-2015.html"&gt;2015&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a href="http://www.securitywarrior.org/"&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a href="http://chuvakin.blogspot.com/2011/07/last-blog-post.html"&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a href="http://blogs.gartner.com/anton-chuvakin"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href="http://chuvakin.blogspot.com/2016/07/monthly-blog-round-up-june-2016.html"&gt;Monthly Blog Round-Up – June 2016&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a href="http://chuvakin.blogspot.com/search/label/Monthly"&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;About me: http://www.chuvakin.org&lt;/div&gt;</description><author>anton@chuvakin.org (Anton Chuvakin)</author></item></channel></rss>