<?xml version="1.0"?>
<rss version="2.0" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:yt="http://gdata.youtube.com/schemas/2007" xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
      <title>Top Influencers on IT Security</title>
      <description>Pipes Output</description>
      <link>http://pipes.yahoo.com/pipes/pipe.info?_id=ZNea5EJo3hGTPMa2tJCjyQ</link>
      <atom:link rel="next" href="http://pipes.yahoo.com/pipes/pipe.run?_id=ZNea5EJo3hGTPMa2tJCjyQ&amp;_render=rss&amp;page=2"/>
      <pubDate>Mon, 28 Sep 2015 21:48:33 +0000</pubDate>
      <generator>http://pipes.yahoo.com/pipes/</generator>
      <item>
         <title>Bruce Schneier:   Good Article on the Sony Attack</title>
         <link>https://www.schneier.com/blog/archives/2015/09/good_article_on.html</link>
         <description>Fortune has a three-part article on the Sony attack by North Korea. There's not a lot of tech here; it's mostly about Sony's internal politics regarding the movie and IT security before the attack, and some about their reaction afterwards. Despite what I wrote at the time, I now believe that North Korea was responsible for the attack. This is...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/good_article_on.html</guid>
         <pubDate>Mon, 28 Sep 2015 11:22:19 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   Friday Squid Blogging: Disney's Minigame Squid Wars</title>
         <link>https://www.schneier.com/blog/archives/2015/09/friday_squid_bl_495.html</link>
         <description>It looks like a Nintendo game. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/friday_squid_bl_495.html</guid>
         <pubDate>Fri, 25 Sep 2015 21:30:16 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   Anti-Alien Security</title>
         <link>https://www.schneier.com/blog/archives/2015/09/anti-alien_secu.html</link>
         <description>You can wrap your house in tinfoil, but when you start shining bright lights to defend yourself against alien attack, you've gone too far. In general, society puts limits on what types of security you are allowed to use, especially when that use can affect others. You can't place landmines on your lawn or shoot down drones hovering over your...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/anti-alien_secu.html</guid>
         <pubDate>Fri, 25 Sep 2015 19:23:08 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   People Who Need to Pee Are Better at Lying</title>
         <link>https://www.schneier.com/blog/archives/2015/09/people_who_need.html</link>
         <description>No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates performance in another (simultaneously conducted) self-control task. Deceiving requires increased access to inhibitory control. We hypothesized that inducing liars to control urination urgency (physical inhibition) would facilitate control during deceptive interviews (cognitive inhibition). Participants drank small (low-control) or...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/people_who_need.html</guid>
         <pubDate>Fri, 25 Sep 2015 10:54:39 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   Living in a Code Yellow World</title>
         <link>https://www.schneier.com/blog/archives/2015/09/living_in_a_cod.html</link>
         <description>In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the &quot;combat mind-set.&quot; Here is his summary: In White you are unprepared and unready to take lethal action. If you are attacked in White you will probably die unless your adversary is totally inept. In Yellow you bring yourself to the understanding...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/living_in_a_cod.html</guid>
         <pubDate>Thu, 24 Sep 2015 16:39:06 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   Hacking the Game Show &quot;Press Your Luck&quot;</title>
         <link>https://www.schneier.com/blog/archives/2015/09/hacking_the_gam.html</link>
         <description>Fascinating story about a man who figured out how to hack the game show &quot;Press Your Luck&quot; in 1984....</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/hacking_the_gam.html</guid>
         <pubDate>Wed, 23 Sep 2015 11:05:49 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   Buying an Online Reputation</title>
         <link>https://www.schneier.com/blog/archives/2015/09/buying_an_onlin.html</link>
         <description>The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/buying_an_onlin.html</guid>
         <pubDate>Tue, 22 Sep 2015 18:34:56 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   Bringing Frozen Liquids through Airport Security</title>
         <link>https://www.schneier.com/blog/archives/2015/09/bringing_frozen.html</link>
         <description>Gizmodo reports that UK airport security confiscates frozen liquids: &quot;He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid. When he said I couldn't take it I asked if he knew that for sure or just assumed. He grabbed his supervisor and the supervisor told me that 'the government does not...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/bringing_frozen.html</guid>
         <pubDate>Tue, 22 Sep 2015 18:22:17 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   SYNful Knock Attack Against Cisco Routers</title>
         <link>https://www.schneier.com/blog/archives/2015/09/synful_knock_at.html</link>
         <description>FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case, the targeted victims were Cisco routers. The Mandiant team found 14 instances of this router implant, dubbed SYNful Knock, across four countries: Ukraine, Philippines, Mexico, and India. [...] The implant uses techniques that make it...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/synful_knock_at.html</guid>
         <pubDate>Mon, 21 Sep 2015 16:45:09 +0000</pubDate>
      </item>
      <item>
         <title>Bruce Schneier:   History of Hacktivism</title>
         <link>https://www.schneier.com/blog/archives/2015/09/history_of_hack.html</link>
         <description>Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took the form of computer viruses and worms that spread messages of protest. A good example of early hacktivism is &quot;Worms Against Nuclear Killers (WANK),&quot; a computer worm that anti-nuclear activists in Australia unleashed...</description>
         <guid isPermaLink="false">https://www.schneier.com/blog/archives/2015/09/history_of_hack.html</guid>
         <pubDate>Mon, 21 Sep 2015 11:34:46 +0000</pubDate>
      </item>
      <item>
         <title>C. Warren Axelrod:   Account Hijacking Down? ID Theft OK?</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/ptD0PhtRLgE/</link>
         <description>I was intrigued by a July31, 2015 article “Stolen Consumer Data Is a Smaller Problem Than It Seems,” by New York Times reporter Nathaniel Popper (see http://www.nytimes.com/2015/08/02/business/stolen-consumer-data-is-a-smaller-problem-than-it-seems.html?_r=0 ) in which he claims that account hijacking is down and that ID theft is no big deal. Popper is an excellent reporter on technical matters. His recent [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2629</guid>
         <pubDate>Mon, 21 Sep 2015 10:00:31 +0000</pubDate>
         <content:encoded><![CDATA[<p>I was intrigued by a July31, 2015 article “Stolen Consumer Data Is a Smaller Problem Than It Seems,” by <strong><em>New York Times</em></strong> reporter Nathaniel Popper (see <a rel="nofollow" target="_blank" href="http://www.nytimes.com/2015/08/02/business/stolen-consumer-data-is-a-smaller-problem-than-it-seems.html?_r=0">http://www.nytimes.com/2015/08/02/business/stolen-consumer-data-is-a-smaller-problem-than-it-seems.html?_r=0</a> ) in which he claims that account hijacking is down and that ID theft is no big deal.</p>
<p>Popper is an excellent reporter on technical matters. His recent book “Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money” and related articles in <strong><em>The New York Times</em></strong> show a deep understanding of technological, economic and social issues relating to crypto-currencies. However, he appears to have become a victim of “voodoo statistics” when he tries to explain how the data indicate that the number of account hijackings is falling.</p>
<p>Popper uses various statistical sources to demonstrate that account hijackings, while rising in number of cases, incur less cost overall. Unfortunately, in a situation where perhaps 95 percent of account hijacks, according to the <strong><em>2015 Verizon DBIR</em></strong> (Data Breach Investigations Report), which is available from <a rel="nofollow" target="_blank" href="http://www.verizonenterprise.com/DBIR/2015/">http://www.verizonenterprise.com/DBIR/2015/</a>, never make it to the survey companies and the media, it is poor statistical analysis to draw meaningful conclusions from less than 5 percent of the total number of incidents.</p>
<p>If you accept the 95 percent number (and you don’t have to), then, if losses from account hijacking go from $100 billion to $200 billion say, reported losses would increase from $5 billion to $10 billion. Yes, the number doubles in both situations, but now unreported losses have gone from $90 billion to $180 billion, suggesting an enormous increase in impact of $90 billion in unreported losses versus the $5 billion reported. Now, if we assume that, with the increased volume, the percentage reported drops to say 3 percent, we have $6 billion in reported losses—a mere $1 billion increase when the actual increase is $100 billion. This is very much a case of the tail wagging the dog. A small change in percentage reported versus unreported can have a huge impact on our estimates, easily switching analysts from one conclusion to another.</p>
<p>From the rapid-fire news reports of major data breaches, one might easily presume that data breaches are indeed way up in both number and size. Also, when ID theft occurs, the true anguish of re-establishing one’s credit credentials is barely seen in public, but it does exist and it is considerable. Popper’s claim that ID theft has been declining is in question with recent breaches, such as the one at the government’s Office of Personnel Management and the notorious Ashley Madison breach, making the headlines. Popper does state that the apparent downward trend of ID thefts will change and head upwards. However, it’s doubtful that the number of ID thefts actually went down in the first place.</p>
<p>I can understand Popper wanting to express some hope that we might be deflecting the avalanche of data breaches leading to account hijacking and ID theft. But the basis for such optimism is shaky. While such reporting may make individuals more optimistic about the directions of the consequences of data breaches, it serves to reduce the pressure on companies and government agencies to improve their data protection and incident response programs, which is not a good thing.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/ptD0PhtRLgE" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   Good Morning Karen. Cool or Scary?</title>
         <link>http://taosecurity.blogspot.com/2015/09/good-morning-karen-cool-or-scary.html</link>
         <description>&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/--NFooznjI30/VfWRpcLdw5I/AAAAAAAAMio/zqj6AP0MIKs/s1600/good%2Bmorning%2Bkaren.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;172&quot; src=&quot;http://4.bp.blogspot.com/--NFooznjI30/VfWRpcLdw5I/AAAAAAAAMio/zqj6AP0MIKs/s320/good%2Bmorning%2Bkaren.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;Last month I spoke at a telecommunications industry event. The briefer before me showed a video by the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.hypervoice.org/&quot;&gt;Hypervoice Consortium&lt;/a&gt;, titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://vimeo.com/118044275&quot;&gt;Introducing Human Technology: Communications 2025&lt;/a&gt;. It consists of a voiceover by a 2025-era Siri-like assistant, speaking to her owner, &quot;Karen.&quot; The assistant describes what's happening with Karen's household. 15 seconds into the video, the assistant says:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The report is due today. I've cleared your schedule so you can focus. Any attempt to override me will be politely rebuffed.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;I was already feeling uncomfortable with the scenario, but that is the point at which I really started to squirm. I'll leave it to you to watch the rest of the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://vimeo.com/118044275&quot;&gt;video&lt;/a&gt; and report how you feel about it.&lt;br /&gt;&lt;br /&gt;My general conclusion was that I'm wary of putting so much trust in a platform that is likely to be targeted by intruders, such that they can manipulate so many aspects of a person's life. What do you think?&lt;br /&gt;&lt;br /&gt;By the way, the briefer before me noted that every vision of the future appears to involve solving the &quot;low on milk problem.&quot;&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-6277841568573140135</guid>
         <pubDate>Sun, 13 Sep 2015 11:16:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/--NFooznjI30/VfWRpcLdw5I/AAAAAAAAMio/zqj6AP0MIKs/s72-c/good%2Bmorning%2Bkaren.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>C. Warren Axelrod:   Medical Identity Theft … Where Have You Been, WSJ?</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/_h0815P1UUY/</link>
         <description>The Wall Street Journal published a front-page article “The Doctor Bill from Identity Thieves” by Stephanie Armour on August 8, 2015 as if medical identity theft is a new issue. It isn’t. My colleague Allan Pomerantz wrote a BlogInfoSec column on the subject more than seven years ago &amp;#8230; see http://www.bloginfosec.com/2008/06/19/medical-identity-theft-your-money-or-your-life/ The annual Ponemon study [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2625</guid>
         <pubDate>Tue, 08 Sep 2015 10:00:48 +0000</pubDate>
         <content:encoded><![CDATA[<p><strong><em>The Wall Street Journal</em></strong> published a front-page article “The Doctor Bill from Identity Thieves” by Stephanie Armour on August 8, 2015 as if medical identity theft is a new issue. It isn’t. My colleague Allan Pomerantz wrote a <strong><em>BlogInfoSec</em></strong> column on the subject more than seven years ago &#8230; see <a rel="nofollow" target="_blank" href="http://www.bloginfosec.com/2008/06/19/medical-identity-theft-your-money-or-your-life/">http://www.bloginfosec.com/2008/06/19/medical-identity-theft-your-money-or-your-life/</a> The annual Ponemon study on medical identity theft, which Armour cites, is in its fifth year &#8230; see <a rel="nofollow" target="_blank" href="http://medidfraud.org/wp-content/uploads/2015/02/2014_Medical_ID_Theft_Study1.pdf">http://medidfraud.org/wp-content/uploads/2015/02/2014_Medical_ID_Theft_Study1.pdf</a> So medical identity theft is by no means a new issue, just one that has been ignored.</p>
<p>Allan raised may of the critical issues described in the <strong><em>WSJ</em></strong> article and added that medical identity theft is underreported. He was right, and still is. If it has taken all this time for the matter to appear on the front page of a major newspaper, then the subject has certainly not received the attention it warrants. Seven years of lost time is huge in the cybersecurity arena where events typically occur in milliseconds.</p>
<p>And the health industry appears to have done little to alleviate the problem. I recently advised someone to request that their health insurance company change the patient’s insurance coverage number following the Anthem breach and in response to clear evidence that stolen identities were being used for various nefarious purposes. The insurance-company employee responded that there wasn’t any way in which they could make the change &#8230; and, besides, no one else had requested such a change before. Of course, that is a ridiculous response. When you are aware that a payment card has been lost, stolen or otherwise compromised, financial institutions are quick to issue a new card and cancel the old card to limit their own losses. It would appear that, in the health-services industry, the burden is firmly on the insured. Perhaps the losses to the health industry itself are not particularly significant. And furthermore, some health-services providers may be actually benefitting from such fraud. After all, they do not appear to be liable if someone comes in for medical services using a valid health-insurance ID.</p>
<p>As Allan’s column and the <strong><em>WSJ</em></strong> article point out, the consequences of medical identity theft can be far greater in terms of physical safety than the losses incurred in financial fraud. The fact that HIPAA might actually work against resolving the issues and not protect valid insured individuals from the impact of medical identity theft is unconscionable. The <strong><em>WSJ</em></strong> article lists six consequences ranging from having all one’s benefits stolen and having valid claims denied through loss of insurance, unjustified out-of-pocket payments, cost of fixing credit reports and resulting lowering of credit scores, to being unable to access one’s own health records because HIPAA protects the health information of identity thieves that are co-mingled with victims’ records. It should be noted, however, that in an August 14, 2015 <strong><em>Letter to the Editor</em></strong> “Don’t Blame the Poor Victims of Medical Identity Thefts,” Jennifer Comerford claims that the article’s assertion that medical ID thieves are protected by medical-privacy laws is in fact not the case. Comerford states that “All individuals should be aware that they have the right to appeal refusal of access to their medical records.” If this is indeed true, we are being misled big time by those who claim otherwise.</p>
<p>I’m glad that Allan’s issues are at last making it to mainstream media. Perhaps legislators will recognize the failing in their laws and correct them, even if it means that a qualified third party (not insurance companies) is given the right to review the claims records and determine which of them are fraudulent. If a parallel law to the Fair Credit Reporting Act, which pertains to financial institutions were established, namely, that the victims have very limited liability (say $50) and that it is up to the vendor (bank or insurance company or health services provider) to either eat the losses or go after the thief, I’m sure that we would see a significant drop in this type of criminal activity.</p>
<p>We must not forget, however, that (differently from U.S. financial institutions) insurance companies are regulated by States rather than the Federal government. This makes the task more challenging but no less worthy. It’s time to eliminate this insidious crime that not only causes financial damage but can lead to physical harm or worse.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/_h0815P1UUY" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   Are Self-Driving Cars Fatally Flawed?</title>
         <link>http://taosecurity.blogspot.com/2015/09/are-self-driving-cars-fatally-flawed.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-N1jN3d0G1_Q/Ve2ESQmWv-I/AAAAAAAAMgc/iJWskuRarZA/s1600/lidar.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;292&quot; src=&quot;http://1.bp.blogspot.com/-N1jN3d0G1_Q/Ve2ESQmWv-I/AAAAAAAAMgc/iJWskuRarZA/s320/lidar.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I read the following in the Guardian story&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.theguardian.com/technology/2015/sep/07/hackers-trick-self-driving-cars-lidar-sensor&quot;&gt;Hackers can trick self-driving cars into taking evasive action&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Hackers can easily trick self-driving cars into thinking that another car, a wall or a person is in front of them, potentially paralysing it or forcing it to take evasive action.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Automated cars use laser ranging systems, known as lidar, to image the world around them and allow their computer systems to identify and track objects. But a tool similar to a laser pointer and costing less than $60 can be used to confuse lidar...&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;The following appeared in the IEEE Spectrum story &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://spectrum.ieee.org/cars-that-think/transportation/self-driving/researcher-hacks-selfdriving-car-sensors&quot;&gt;Researcher Hacks Self-driving Car Sensors&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Using such a system, attackers could trick a self-driving car into thinking something is directly ahead of it, thus forcing it to slow down. Or they could overwhelm it with so many spurious signals that the car would not move at all for fear of hitting phantom obstacles...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Petit acknowledges that his attacks are currently limited to one specific unit but says, “The point of my work is not to say that IBEO has a poor product. I don’t think any of the lidar manufacturers have thought about this or tried this.”&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;I had the following reactions to these stories.&lt;br /&gt;&lt;br /&gt;First, it's entirely possible that self-driving car manufacturers know about this attack model. They might have decided that it's worth producing cars despite the technical vulnerability. For example, there is no defense in WiFi for jamming the RF spectrum. There are also non-RF jamming methods to disrupt WiFi, as detailed &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.pwnieexpress.com/mobile-wifi-jamming/&quot;&gt;here&lt;/a&gt;. Nevertheless, WiFi is everywhere, but lives usually don't depend on it.&lt;br /&gt;&lt;br /&gt;Second, researcher Jonathan Petit appears to have tested an IBEO Lux lidar unit and not a real self-driving car. We don't know, from the Guardian or IEEE Spectrum articles at least, how a Google self-driving car would handle this attack. Perhaps the vendors have already compensated for it.&lt;br /&gt;&lt;br /&gt;Third, these articles may undermine one of the presumed benefits of self-driving cars: that they are supposed to be safer than human drivers. If self-driving car technology is vulnerable to an attack not found in driver-controlled cars, that is a problem.&lt;br /&gt;&lt;br /&gt;Fourth, does this attack mean that driver-controlled cars with similar technology are also vulnerable, or will be? Are there corresponding attacks for systems that detect obstacles on the road and trigger the brakes before the driver can physically respond?&lt;br /&gt;&lt;br /&gt;Last, these articles demonstrate the differences between safety and security. Safety, in general, is a discipline designed to improve the well-being of people facing natural, environmental, mindless threats. Security, in contrast, is designed to counter intelligent, adaptive adversaries. I am predisposed to believe that self-driving car manufacturers have focused on the safety aspects of their products far more than the security aspects. It's time to address that imbalance.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-8502174541822925048</guid>
         <pubDate>Mon, 07 Sep 2015 08:53:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-N1jN3d0G1_Q/Ve2ESQmWv-I/AAAAAAAAMgc/iJWskuRarZA/s72-c/lidar.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – August 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/AY3iMYGtbMM/monthly-blog-round-up-august-2015.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current popularity of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. Succeeding with &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. That – and developing a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; is much harder than most people think&amp;nbsp; &lt;i&gt;[274 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;i&gt;[101 pageviews]&lt;/i&gt;  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.1 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;) &lt;i&gt;[95+ pageviews to the main tag]&lt;/i&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2845417&quot;&gt;here in this paper&lt;/a&gt;). &lt;i&gt;[94 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/08/18/my-evaluation-criteria-for-security-information-and-event-management-2015-update-publishes/&quot;&gt;this document&lt;/a&gt; [2015 update]) &lt;i&gt;[74 pageviews out of a total of 4157 views]&lt;/i&gt; &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Current research on VA tools and VM practices:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/08/07/revisiting-vulnerability-assessment-and-vulnerability-management-research/&quot;&gt;Revisiting Vulnerability Assessment and Vulnerability Management Research&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Current &lt;u&gt;maverick&lt;/u&gt; research on AI/smart machines risks:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/07/10/on-evil-ais-and-evil-people/&quot;&gt;On Evil AIs and Evil People&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Past research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/07/30/my-how-to-monitor-the-security-of-public-cloud-resources-publishes/&quot;&gt;My “How to Monitor the Security of Public Cloud Resources” Publishes&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/22/trouble-in-the-cloud/&quot;&gt;Trouble In The Cloud?!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/26/cloud-security-monitoring-revisited-aka-it-is-not-2012-anymore-4/&quot;&gt;Cloud Security Monitoring … Revisited (aka It Is Not 2012 Anymore!)&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/08/04/your-soc-nuclear-triad/&quot;&gt;Your SOC Nuclear Triad&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/08/13/threat-intelligence-and-operational-agility/&quot;&gt;Threat Intelligence and Operational Agility&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/08/31/on-space-between-detection-and-response/&quot;&gt;On Space Between Detection and Response&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/07/24/on-tanks-vs-tractors/&quot;&gt;On Tanks vs Tractors&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/24/enable-the-business-sometimes-security-must-say-no/&quot;&gt;Enable the Business? Sometimes Security Must Say “NO”…&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/08/monthly-blog-round-up-july-2015.html&quot;&gt;Monthly Blog Round-Up – July 2015&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=AY3iMYGtbMM:BoUWkK2jFXQ:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=AY3iMYGtbMM:BoUWkK2jFXQ:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=AY3iMYGtbMM:BoUWkK2jFXQ:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/AY3iMYGtbMM&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-6088347626355229880</guid>
         <pubDate>Tue, 01 Sep 2015 16:16:08 +0000</pubDate>
      </item>
      <item>
         <title>C. Warren Axelrod:   People Problems at the NYSE</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/1hEc8hTCLyc/</link>
         <description>Recent newspaper articles tried to explain the 4-hour downtime on Wednesday, July 8, 2015, which was experienced by the New York Stock Exchange (NYSE) during the trading day. The knee-jerk reaction was that it was a coordinated cyber attack, since The Wall Street Journal home page and United Airlines had widely-reported outages the same day. [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2621</guid>
         <pubDate>Mon, 24 Aug 2015 10:00:49 +0000</pubDate>
         <content:encoded><![CDATA[<p>Recent newspaper articles tried to explain the 4-hour downtime on Wednesday, July 8, 2015, which was experienced by the <strong><em>New York Stock Exchange</em></strong> (NYSE) during the trading day. The knee-jerk reaction was that it was a coordinated cyber attack, since <strong><em>The Wall Street Journal</em></strong> home page and <strong><em>United Airlines</em></strong> had widely-reported outages the same day. When that theory was negated, attention turned to how such a prolonged outage at the NYSE could have happened. After all, aren’t core financial systems backed-up and ready to fail over instantaneously to redundant systems and then to disaster recovery sites if the on-site backup systems don’t work?</p>
<p>Finally some reporters came to the conclusion that the root cause of the outage was the Draconian firing practices by ICE (Intercontinental Exchange), on taking over NYSE Euronext, which eliminated of 40 percent of NYSE’s staff including those with decades of experience running the NYSE’s systems. Apparently this loss of expertise meant that those remaining, with relatively less experience, had much greater difficulty in attempting to bring the systems back.</p>
<p>I can relate to all of the above. In the 1970s I worked for SIAC (Securities Industry Automation Corporation) beginning soon after its inception. SIAC was formed from merging of the IT (then EDP) department of the NYSE with the IT department of its much smaller sibling, the Amex (American Stock Exchange). At that time, SIAC ran both exchange’s computer systems supporting the two trading floors and back-office clearance and settlement systems. The NYSE had higher-end expensive redundant trading-floor systems which were designed to fail over automatically to “hot” backup systems not once, but twice, with no loss of transactions. The Amex, in contrast, ran two independent simpler and cheaper systems. If one failed, Amex operators threw a physical switch from one system to the other and the couple of transactions not processed in the switchover were re-entered manually.</p>
<p>During the 1970s computers were orders of magnitude less reliable than they are today. Hardly a day went by that the huge (for that time) IBM computers had to be IPLed (or rebooted) following a component failure or a software abend (abnormal end). These procedures often meant that trading had to be halted until the systems could be brought back up. To overcome such outages, the NYSE installed what was called “large core storage” or LCS. LCS, as the name implies, was high-speed memory comprising tiny donut-shaped magnets with wires running through them. The idea was that LCS would be shared among all three active computers systems &#8230; the primary system, hot backup and warm backup. If the active system went down, the hot backup would pick up instantaneously without the loss of a single transaction using up-to-the-second data stored in the common LCS. If the backup system failed also, then the third system would be brought online and would also pick up the most recent transaction data from the LCS.</p>
<p>Much to everyone’s surprise, the NYSE experienced a whole series of outages over a given period of time compared to hardly any downtime at the Amex. How could this be? It turned out that, from time to time, the active NYSE system corrupted LCS data, which caused it to fail. The other two systems, in turn, picked up the corrupted data and also failed. The simple answer to the problem was to isolate the systems and simplify recovery as the Amex had done. Here simplicity trumped complexity.</p>
<p>My other experiences, which support the claim that ICE had iced experts who could have possibly handled the recent outage more expeditiously, were during my tenures as a senior IT executive at two financial services companies. It became very clear to me, in both cases, that the health and well-being of computer systems frequently depend on a handful of individuals, many of whom were involved in the development of the original systems and had experienced a host of problems, which they had learned to fix through bitter experience. Most of the knowledge was in their heads, even though documentation on the applications and operational procedures usually existed. I learned to value those individuals and depend on them to deal quickly, effectively and selflessly with issues as they arose. They were the real heroes of keeping the systems humming.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/1hEc8hTCLyc" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   Top Ten Books Policymakers Should Read on Cyber Security</title>
         <link>http://taosecurity.blogspot.com/2015/08/top-ten-books-policymakers-should-read.html</link>
         <description>I've been meeting with policymakers of all ages and levels of responsibility during the last few months. Frequently they ask &quot;what can I read to better understand cyber security?&quot; I decided to answer them collectively in this quick blog post.&lt;br /&gt;&lt;br /&gt;By posting these, I am not endorsing everything they say (with the exception of the last book). On balance, however, I think they provide a great introduction to current topics in digital security.&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Cybersecurity-Cyberwar-Everyone-Needs-KnowRG-ebook/dp/B00GJG6ZB2&quot;&gt;Cybersecurity and Cyberwar: What Everyone Needs to Know&lt;/a&gt; by Peter W. Singer and Allan Friedman&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital-ebook/dp/B00KEPLC08/&quot;&gt;Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon&lt;/a&gt; by Kim Zetter&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/War-Rise-Military-Internet-Complex-ebook/dp/B00HP6T7V0/&quot;&gt;@War: The Rise of the Military-Internet Complex&lt;/a&gt; by Shane Harris&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/dp/B00U6DQRHG/&quot;&gt;China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain&lt;/a&gt; by&amp;nbsp;&amp;nbsp;Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/dp/B00L3KQ1LI/&quot;&gt;Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World&lt;/a&gt; by Bruce Schneier&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Spam-Nation-Organized-Cybercrime-Epidemic-ebook/dp/B00L5QGBL0/&quot;&gt;Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door&lt;/a&gt; by Brian Krebs&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Future-Crimes-Everything-Connected-Vulnerable-ebook/dp/B00N6PCZMC/&quot;&gt;Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It&lt;/a&gt; by Marc Goodman&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Chinese-Industrial-Espionage-Acquisition-Modernisation-ebook/dp/B00DEGJC1A/&quot;&gt;Chinese Industrial Espionage: Technology Acquisition and Military Modernisation&lt;/a&gt; by&amp;nbsp;William C. Hannas, James Mulvenon, and Anna B. Puglisi&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/dp/B00ET38G9G/&quot;&gt;Cyber War Will Not Take Place&lt;/a&gt; by Thomas Rid&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://nostarch.com/nsm&quot;&gt;The Practice of Network Security Monitoring: Understanding Incident Detection and Response&lt;/a&gt; by Richard Bejtlich (use code NSM101 to save 30%; I prefer the print copy!)&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;Enjoy!&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-7479149578684679371</guid>
         <pubDate>Fri, 14 Aug 2015 15:28:00 +0000</pubDate>
      </item>
      <item>
         <title>C. Warren Axelrod:   Software Security Recall for Jeeps</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/_LiqabrC5mI/</link>
         <description>Author’s Note: This is a follow-up to my July 27, 2015 BlogInfoSec column “Jeep Hacked, Manufacturer ‘Dismayed.’” Fiat Chrysler’s recall of vehicles for security-related, versus safety-related, vulnerabilities is a very big deal and may pave the way for an entirely new approach to companies assuming liability for, and dealing with software bugs. &amp;#8212;- There have [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2617</guid>
         <pubDate>Mon, 10 Aug 2015 10:00:17 +0000</pubDate>
         <content:encoded><![CDATA[<p>Author’s Note: This is a follow-up to my July 27, 2015 <strong><em>BlogInfoSec</em></strong> column “Jeep Hacked, Manufacturer ‘Dismayed.’” Fiat Chrysler’s recall of vehicles for security-related, versus safety-related, vulnerabilities is a very big deal and may pave the way for an entirely new approach to companies assuming liability for, and dealing with software bugs.</p>
<p>&#8212;-</p>
<p>There have been quite a number of previous vehicle software malfunctions (call them “bugs,” “glitches,” or what have you) in the past, such as the Toyota Prius recall in 2010 affecting the anti-lock braking system &#8230; see <a rel="nofollow" target="_blank" href="http://www.bloomberg.com/slideshow/2012-08-03/the-big-cost-of-software-bugs.html#slide9">http://www.bloomberg.com/slideshow/2012-08-03/the-big-cost-of-software-bugs.html#slide9</a> and the more recent (July 2015) Prius recall for software that might shut down the hybrid system while the car is being driven &#8230; see <a rel="nofollow" target="_blank" href="http://www.reuters.com/article/2015/07/15/us-toyota-recall-idUSKCN0PP0EF20150715">http://www.reuters.com/article/2015/07/15/us-toyota-recall-idUSKCN0PP0EF20150715</a></p>
<p>But, up until now, affected systems have been vehicle-control systems which are clearly under the auspices of the automobile manufacturers and the latter have assumed liability.</p>
<p>However, the most recent such matter, in which Fiat Chrysler agreed to recall 1.4 million vehicles to fix a security bug that allows the infotainment system to be hacked remotely and the attacker to jump over to the control systems, is the first of its kind, as far as I know. But it is unlikely to be the last. The event is described in Andy Greenberg’s article in his July 24, 2015 article “After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix” available at <a rel="nofollow" target="_blank" href="http://www.wired.com/2015/07/jeep-hack-chrysler-recalls-1-4m-vehicles-bug-fix/">http://www.wired.com/2015/07/jeep-hack-chrysler-recalls-1-4m-vehicles-bug-fix/</a></p>
<p>This emergence of software-related recalls reminded me of my letter to the editor, which was printed in <strong><em>The New York Times </em></strong>on June 18, 1999, with the title “Are ‘Viruses’ Naughty by Nature?” available at <a rel="nofollow" target="_blank" href="http://www.nytimes.com/1999/06/18/opinion/l-are-viruses-naughty-by-nature-222801.html">http://www.nytimes.com/1999/06/18/opinion/l-are-viruses-naughty-by-nature-222801.html</a></p>
<p>&nbsp;</p>
<p>In the letter, which was in response to a June 14, 1999 news article, “Illness as a Metaphor for Computer Bugs,” I compared the expectation of recalls on vehicles for safety defects to the lack of liability on the part of software developers, as follows:</p>
<p>“When we buy a car, we expect certain safety features to be built in, and if they don’t work, then the vehicle is recalled and fixed at no charge. We should expect the same guarantee from software developers.”</p>
<p>It is interesting to note that this is now actually beginning to happen, albeit by a circuitous route. Granted it is because of a vulnerability in software running on a motor vehicle that is not directly in control of safety-related features, but could this be a precedent for software resident on all devices (the Internet of Things), vehicles, etc.? If it becomes so, then we are at the start of a sea change in how software is viewed, especially IT software that can be bridged across to control systems &#8230; which eventually may be ALL software.</p>
<p>I had called for more rigorous design, development and testing of security-critical and safety-critical software in my book “Engineering Safe and Secure Software Systems,” (Artech House, 2012) especially when such systems are connected and interoperate, but had never expected that the issue would rear its ugly head so soon &#8230; shades of the movie “The Day After Tomorrow,” or perhaps William R. Forstchen’s book “One Second After.”</p>
<p>We have certainly arrived at a new era of software dependency and are beginning to experience the hazards of interfacing Web-facing software with safety-critical systems. If it were up to me, I would call a halt to all these systems until a reliable set of standards and certifications have been fully established but, of course, that’s not going to happen. The pressure to innovate, particularly in the area of automating road vehicles, is too great. The juggernaut cannot be held back. Instead we will be subjected to repeated software malfunctions and failures, vehicle takeovers, and all that they imply and, as with hacks affecting commercial and governmental information systems, there will be a lot of “tut-tuts” by politicians, followed by ineffective attempts to regulate minimally. And then life will go on &#8230; until the “big one.” But, by then it will be too late to do anything.</p>
<p>As Forstchen describes in his novel, the only vehicles running may be from decades earlier, when there were no electronics in them. But how many of these antiques are still operating? And what about getting gasoline? The delivery trucks wouldn’t be drivable either and the pumps wouldn’t work at the gas stations, as we in the North-East (USA) discovered in the aftermath of Hurricane Sandy. Sandy was an act of Nature that we couldn’t prevent, although we might have been better prepared to deal with the consequences. The catastrophic failure or mass takeover of vehicles can still be avoided, if we have the mind to do it.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/_LiqabrC5mI" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   Effect of Hacking on Stock Price, Or Not?</title>
         <link>http://taosecurity.blogspot.com/2015/08/effect-of-hacking-on-stock-price-or-not.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-dBrLUjGUBRw/VcVCiZ-98bI/AAAAAAAAL8s/fq5MkHZcgng/s1600/ubnt-krebs.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;301&quot; src=&quot;http://2.bp.blogspot.com/-dBrLUjGUBRw/VcVCiZ-98bI/AAAAAAAAL8s/fq5MkHZcgng/s320/ubnt-krebs.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I read Brian Krebs story&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://krebsonsecurity.com/2015/08/tech-firm-ubiquiti-suffers-46m-cyberheist/&quot;&gt;Tech Firm Ubiquiti Suffers $46M Cyberheist&lt;/a&gt; just now. He writes:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Ubiquiti, a San Jose based maker of networking technology for service providers and enterprises, disclosed the attack in a quarterly financial report filed this week&lt;/i&gt;&amp;nbsp;[6 August; RMB]&lt;i&gt;&amp;nbsp;with the U.S. Securities and Exchange Commission (SEC). The company said it discovered the fraud on June 5, 2015, and that the incident involved employee impersonation and fraudulent requests from an outside entity targeting the company’s finance department.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;“This fraud resulted in transfers of funds aggregating $46.7 million held by a Company subsidiary incorporated in Hong Kong to other overseas accounts held by third parties,” Ubiquiti wrote. “As soon as the Company became aware of this fraudulent activity it initiated contact with its Hong Kong subsidiary’s bank and promptly initiated legal proceedings in various foreign jurisdictions. As a result of these efforts, the Company has recovered $8.1 million of the amounts transferred.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Brian credits&amp;nbsp;Brian Honan at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.csoonline.com/article/2961066/supply-chain-security/ubiquiti-networks-victim-of-39-million-social-engineering-attack.html&quot;&gt;CSO Online&lt;/a&gt;, with noticing the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.sec.gov/Archives/edgar/data/1511737/000157104915006288/t1501817_8k.htm&quot;&gt;disclosure&lt;/a&gt; yesterday.&lt;br /&gt;&lt;br /&gt;This is a terrible crime that I would not wish upon anyone. My interest in this issue has nothing to do with&amp;nbsp;Ubiquiti as a company, nor is it intended as a criticism of the company. The ultimate fault lies with the criminals who perpetrated this fraud. The purpose of this post is to capture some details for the benefit of analysis, history, and discussion.&lt;br /&gt;&lt;br /&gt;The first question I had was: did this event have an effect on the&amp;nbsp;Ubiquiti stock price? The &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://finance.yahoo.com/news/ubiquiti-networks-reports-fourth-quarter-200500339.html&quot;&gt;FY fourth quarter results&lt;/a&gt; were released at 4:05 pm ET on Thursday 6 August 2015, after the market closed.&lt;br /&gt;&lt;br /&gt;The &quot;Fourth Quarter Financial Summary: listed this as the last bullet:&lt;br /&gt;&lt;br /&gt;&quot;GAAP net income and diluted EPS include a $39.1 million business e-mail compromise (&quot;BEC&quot;) fraud loss as disclosed in the Form 8-K filed on August 6, 2015&quot;&lt;br /&gt;&lt;br /&gt;I assume the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.sec.gov/Archives/edgar/data/1511737/000157104915006288/t1501817_8k.htm&quot;&gt;Form 8-K&lt;/a&gt; was published simultaneously, with earnings.&lt;br /&gt;&lt;br /&gt;Next I found the following in this five day stock chart.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-JDPEfXkunQw/VcVE2U-lW-I/AAAAAAAAL84/IoUs3pm2Cno/s1600/ubnt-5day.jpg&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;436&quot; src=&quot;http://2.bp.blogspot.com/-JDPEfXkunQw/VcVE2U-lW-I/AAAAAAAAL84/IoUs3pm2Cno/s640/ubnt-5day.jpg&quot; width=&quot;640&quot;/&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;5 day UBNT Chart (3-7 August 2015)&lt;/div&gt;&lt;br /&gt;You can see the gap down from Thursday's closing price, on the right side of the chart. Was that caused by the fraud charge?&lt;br /&gt;&lt;br /&gt;I looked to see what the financial press had to say. I found this Motley Fool article titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.fool.com/investing/general/2015/08/07/why-ubiquiti-networks-inc-briefly-fell-11-on-frida.aspx&quot;&gt;Why Ubiquiti Networks, Inc. Briefly Fell 11% on Friday&lt;/a&gt;, posted at&amp;nbsp;12:39 PM (presumably ET). However, this article had nothing to say about the fraud.&lt;br /&gt;&lt;br /&gt;Doing a little more digging, I saw Seeking Alpha caught the fraud immediately, posting &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://seekingalpha.com/news/2706306-ubiquiti-discloses-39_1m-fraud-loss-shares-minus-2_9-percent-post-earnings&quot;&gt;Ubiquiti discloses $39.1M fraud loss; shares -2.9% post-earnings&lt;/a&gt;&amp;nbsp;at 4:24 PM (presumably ET). &amp;nbsp;They noted that &quot;accounting chief Rohit Chakravarthy has resigned.&quot; I learned that the company was already lacking a chief financial officer, so Mr.&amp;nbsp;Chakravarthy was filling the role temporarily. Perhaps that contributed to the company falling victim to the ruse. Could Ubiquiti have been targeted for that reason?&lt;br /&gt;&lt;br /&gt;I did some more digging, but it looks like the popular press didn't catch the issue until Brian Honan and Brian Krebs brought attention to the fraud angle of the earnings release, early today.&lt;br /&gt;&lt;br /&gt;Next I listened to the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://ir.ubnt.com/events.cfm&quot;&gt;archive of the earnings call&lt;/a&gt;. The call was a question-and-answer session, rather than a statement by management followed by Q and A. I listened to analysts ask about head count, South American sales, trademark names, shipping new products, and voice and video. Not until the 17 1/2 minute mark did an analyst ask about the fraud.&lt;br /&gt;&lt;br /&gt;CEO&amp;nbsp;Robert J. Pera said he was surprised no one had asked until that point in the call. He said he was embarrassed by the incident and it reflected&amp;nbsp;&quot;incredibly poor judgement and incompetence&quot; by a few people in the accounting department.&lt;br /&gt;&lt;br /&gt;Finally, returning to the stock chart, you see a gap down, but recovery later in the session. The market seems to view this fraud as a one-time event that will not seriously affect future performance. That is my interpretation, anyway. I wish Ubiquiti well, and I hope others can learn from their misfortune.&lt;br /&gt;&lt;br /&gt;Update: I forgot to add this before hitting &quot;post&quot;:&lt;br /&gt;&lt;br /&gt;Ubiquiti had FY fourth quarter revenues of $145.3 million. The fraud is a serious portion of that number. If Ubiquiti had earned ten times that in revenue, or more, would the fraud have required disclosure?&lt;br /&gt;&lt;br /&gt;The disclosure noted:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&quot;As a result of this investigation, the Company, its Audit Committee and advisors have concluded that the Company’s internal control over financial reporting is ineffective due to one or more material weaknesses.&quot;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;That sounds like code for a&amp;nbsp;Sarbanes-Oxley issue, so I believe they would have reported anyway, regardless of revenue-to-fraud proportions.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-7737102715842697636</guid>
         <pubDate>Fri, 07 Aug 2015 20:19:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://2.bp.blogspot.com/-dBrLUjGUBRw/VcVCiZ-98bI/AAAAAAAAL8s/fq5MkHZcgng/s72-c/ubnt-krebs.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – July 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/ocCo93FeToM/monthly-blog-round-up-july-2015.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current popularity of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. Succeeding with &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. That – and developing a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; is much harder than most people think&amp;nbsp; &lt;i&gt;[291 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;i&gt;[133 pageviews]&lt;/i&gt;  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;) &lt;i&gt;[120+ pageviews to the main tag]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;i&gt;[114 pageviews]&lt;/i&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases. &lt;i&gt;[62 pageviews of total 4862 pageviews to all blog pages]&lt;/i&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br&gt;&lt;br&gt;&lt;strong&gt;Current &lt;u&gt;maverick&lt;/u&gt; research on AI/smart machines risks:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/07/10/on-evil-ais-and-evil-people/&quot;&gt;On Evil AIs and Evil People&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Past research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/07/30/my-how-to-monitor-the-security-of-public-cloud-resources-publishes/&quot;&gt;My “How to Monitor the Security of Public Cloud Resources” Publishes&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/22/trouble-in-the-cloud/&quot;&gt;Trouble In The Cloud?!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/26/cloud-security-monitoring-revisited-aka-it-is-not-2012-anymore-4/&quot;&gt;Cloud Security Monitoring … Revisited (aka It Is Not 2012 Anymore!)&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Past research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security analytics&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/08/my-demystifying-security-analytics-sources-methods-and-use-cases-paper-publishes/&quot;&gt;My “Demystifying Security Analytics: Sources, Methods and Use Cases” Paper Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/01/on-unknown-operational-effectiveness-of-security-analytics-tooling/&quot;&gt;On Unknown Operational Effectiveness of Security Analytics Tooling&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/10/now-that-we-have-all-that-data-what-do-we-do-revisited/&quot;&gt;Now That We Have All That Data What Do We Do, Revisited&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/06/who-validates-alerts-validated-by-your-alert-validator-software/&quot;&gt;Who Validates Alerts Validated by Your Alert Validator Software?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/03/killed-by-ai-much-a-rise-of-non-deterministic-security/&quot;&gt;Killed by AI Much? A Rise of Non-deterministic Security!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/siem-dlp-add-on-brain/&quot;&gt;SIEM / DLP Add-on Brain&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/19/those-pesky-users-how-to-catch-bad-usage-of-good-accounts/&quot;&gt;Those Pesky Users: How To Catch Bad Usage of Good Accounts&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/09/security-analytics-lessons-learned-and-ignored/&quot;&gt;Security Analytics Lessons Learned — and Ignored!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/03/security-analytics-projects-vs-boxes-built-vs-buy/&quot;&gt;Security Analytics: Projects vs Boxes (Build vs Buy)?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security Analytics – Finally Emerging For Real?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;br&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/07/24/on-tanks-vs-tractors/&quot;&gt;On Tanks vs Tractors&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/24/enable-the-business-sometimes-security-must-say-no/&quot;&gt;Enable the Business? Sometimes Security Must Say “NO”…&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/all-my-research-published-in-2014/&quot;&gt;All My Research Published in 2014&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/07/monthly-blog-round-up-june-2015.html&quot;&gt;Monthly Blog Round-Up – June 2015&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=ocCo93FeToM:gkCDtnm10co:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=ocCo93FeToM:gkCDtnm10co:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=ocCo93FeToM:gkCDtnm10co:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/ocCo93FeToM&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-3076605166333128490</guid>
         <pubDate>Mon, 03 Aug 2015 14:40:04 +0000</pubDate>
      </item>
      <item>
         <title>C. Warren Axelrod:   Jeep Hacked, Manufacturer “Dismayed”</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/P2qxUHVIa0w/</link>
         <description>Dismayed? Is that as much emotion that Fiat Chrysler can muster when informed that their vehicles can be hacked remotely and many of the vehicle-control systems can be taken over by researchers Charlie Miller and Chris Valasek, including those systems that handle steering and braking (okay, right now it’s apparently only when the Jeep is [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2612</guid>
         <pubDate>Mon, 27 Jul 2015 10:00:03 +0000</pubDate>
         <content:encoded><![CDATA[<p>Dismayed? Is that as much emotion that Fiat Chrysler can muster when informed that their vehicles can be hacked remotely and many of the vehicle-control systems can be taken over by researchers Charlie Miller and Chris Valasek, including those systems that handle steering and braking (okay, right now it’s apparently only when the Jeep is travelling less than 6 mph, but two tons of metal at 6 mph is big-time kinetic energy). This situation was reported in an article by Nicole Perlroth in an article “Hackers Get Inside a Jeep, and Fiat Chrysler is Dismayed” on page B4 of <strong><em>The New York Times</em></strong> of July 22, 2015. Perhaps they are disappointed, too. But they should be “scared out of their wits,” as should vehicle owners.</p>
<p>As an aside, the remote control of vehicles is by no means new. It has been available for well over a decade with such systems as GM’s OnStar. Not only do these systems open the doors when you are locked out of your vehicle, automatically call for help if they detect that you’ve been in a serious accident, and know your exact location as they provide driving directions, but they also have the capability to disable your vehicle if you report that it has been stolen and they are able to listen into conversations, although GM apparently turned down requests by law enforcement to allow their monitoring of in-vehicle conversations. There is a real and present danger that OnStar and similar systems could be hacked, giving hackers all the OnStar capabilities or that a malicious insider could cause havoc. Newer capabilities, such as steer-by-wire, only give hackers more opportunities to play with.</p>
<p>I first reported on the work by researchers Charlie Miller and Chris Valasek in a presentation “Securing Cyber-Physical Software,” at the <strong><em>OWASP AppSec USA Conference</em></strong>, in New York City, in November 2013, following the publication of my book <strong><em>Engineering Safe and Secure Software Systems </em></strong>(Artech House, December 2012). I showed the video of Andy Greenberg at the wheel of a Toyota Prius at the presentation and remarked that researchers Miller and Valasek were sitting in the back seat of the Prius laughing out loud as they caused all sorts of dangerous vehicle activities. Greenberg’s article appeared in the August 13, 2013 issue of <strong><em>Forbes</em></strong> magazine and is available online at <a rel="nofollow" target="_blank" href="http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/">http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/</a> Miller and Valasek had ripped apart the dashboard of the Prius and connected their laptops. They showed how they could take over many of the operational functions of the vehicle. The industry essentially pooh-poohed the research, saying that it was not practical to perform this experiment in the real world. Much as the airline industry has done the same when responding to researchers’ aircraft systems hacks.</p>
<p>Two years later, Greenberg is reporting on the latest research by Miller and Valasek, referenced above. Here the access is remote over the Internet and the Jeep SUV itself has not been tampered with in any way. The results are especially hair-raising as you can see in the video contained in Andy Greenberg’s July 21, 2015 article “Hackers Remotely Kill a Jeep on the Highway—With Me in It” at <a rel="nofollow" target="_blank" href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/</a> As before, the industry has downplayed the research, stating (in Perlroth’s article) that “anyone with physical access to the car could just as easily cut the brakes.” It seems they missed the point. Fiat Chrysler says “they have issued a patch” and that it was irresponsible of the researchers “to disclose the vulnerability to the public.” The manufacturer’s spokesperson said that the company “monitors and tests its systems to identify and remove security vulnerabilities.” Well, they clearly didn’t do a great job here. Did they perform the exhaustive “functional security testing” that I have been advocating for years? &#8230; Apparently not.</p>
<p>It is really wearying to warn of obvious dangers as we rapidly expand our information and control systems and increasingly tie them together. This is the case with cybersecurity, where today’s data breaches were anticipated more than a decade ago (per my 2001 Congressional testimony and statements by many others far more prestigious than I at that time). The risks are increasing rapidly with control systems as they begin to interoperate with information systems. As I have written many times, there is a major gap in expertise between infosec professionals and safety engineers as systems are brought together and this gap needs to be addressed, as do certification standards. Such certification requirements are spelled out for aircraft and land vehicles, but they are obsolete. Granted that a malfunction or failure of an entertainment system is not nearly as hazardous as a malfunction or failure of a flight-control or vehicle-control system, but when a bridge between these systems is created, then a hack on the former can lead to compromise of the latter. Yet we continue to build systems that are vulnerable with equanimity and blame the deliverers of the message for inappropriately publicizing the dangers. The aircraft and automobile (and train and ship) industries have had fair warning and clearly have not done enough to correct the situation &#8230; in fact they are making it worse by allowing the introduction of inadequately-tested new technologies. What will it take for manufacturers to recognize that they are endangering the populace in their pursuit of cool new features in order to give themselves a marketing edge? And how much greater will the risk be when cars get automatic pilots?</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/P2qxUHVIa0w" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   Going Too Far to Prove a Point</title>
         <link>http://taosecurity.blogspot.com/2015/07/going-too-far-to-prove-point.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-6cBRIAmpMPk/Va5Isq3wkhI/AAAAAAAALWU/ep3N4ycHk28/s1600/jeep.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;http://3.bp.blogspot.com/-6cBRIAmpMPk/Va5Isq3wkhI/AAAAAAAALWU/ep3N4ycHk28/s320/jeep.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I just read&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/&quot;&gt;Hackers Remotely Kill a Jeep on the Highway - With Me&lt;/a&gt; in It by Andy Greenberg. It includes the following:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&quot;I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;To better simulate the experience of driving a vehicle while it’s being hijacked by an invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of attacks they planned to launch from Miller’s laptop in his house 10 miles west. Instead, &lt;b&gt;they merely assured me that they wouldn’t do anything life-threatening&lt;/b&gt;. &lt;b&gt;Then they told me to drive the Jeep onto the highway. &lt;/b&gt;“Remember, Andy,” Miller had said through my iPhone’s speaker just before&lt;b&gt; I pulled onto the I-40 on-ramp&lt;/b&gt;, “no matter what happens, don’t panic.”&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;As the two hackers remotely toyed with the air-conditioning, radio, and windshield wipers, I mentally congratulated myself on my courage under pressure. &lt;b&gt;That’s when they cut the transmission.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Immediately my accelerator stopped working.&lt;/b&gt; As I frantically pressed the pedal and watched the RPMs climb, t&lt;b&gt;he Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;At that point, the interstate began to slope upward, so the Jeep lost more momentum and barely crept forward. &lt;b&gt;Cars lined up behind my bumper before passing me, honking. I could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;“You’re doomed!” Valasek shouted, but I couldn’t make out his heckling over the blast of the radio, now pumping Kanye West. The semi loomed in the mirror, bearing down on my immobilized Jeep.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;I followed Miller’s advice: I didn’t panic. I did, however, drop any semblance of bravery, grab my iPhone with a clammy fist, and beg the hackers to make it stop...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;After narrowly averting death by semi-trailer, &lt;/i&gt;&lt;i style=&quot;font-weight:bold;&quot;&gt;I managed to roll the lame Jeep down an exit ramp, re-engaged the transmission by turning the ignition off and on, and found an empty lot where I could &lt;/i&gt;&lt;u style=&quot;font-style:italic;font-weight:bold;&quot;&gt;safely continue the experiment.&lt;/u&gt;&lt;b style=&quot;font-style:italic;&quot;&gt;&quot; &lt;/b&gt;(emphasis added)&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;I had two reactions to this article:&lt;br /&gt;&lt;br /&gt;1. It is &lt;b&gt;horrifying &lt;/b&gt;that hackers can remotely take control of a vehicle. &lt;b&gt;The auto industry has a lot of work to do.&lt;/b&gt; It's unfortunate that it takes private research and media attention to force a patch (which has now been published.) Hopefully a combination of Congressional attention, product safety laws, and customer pressure will improve the security of the auto industry before lives and property are affected.&lt;br /&gt;&lt;br /&gt;2. It is also &lt;b&gt;horrifying &lt;/b&gt;to conduct a hacking &quot;experiment&quot; on I-40, with vehicles driving at 60 or more MPH, carrying passengers. It's not funny to put lives at risk, whether they are volunteers like the driver/author or other people on the highway.&lt;br /&gt;&lt;br /&gt;Believing it &lt;i&gt;is&lt;/i&gt; ok reflects the same juvenile thinking that motivated another &quot;researcher,&quot; Chris Roberts, to apparently &quot;experiment&quot; with live airplanes, as reported by &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.wired.com/2015/05/feds-say-banned-researcher-commandeered-plane/&quot;&gt;Wired&lt;/a&gt; and other news outlets.&lt;br /&gt;&lt;br /&gt;Hackers are not entitled to jeopardize the lives of innocent people in order to make a point. They can prove their discoveries without putting others, who have not consented to be guinea pigs, at risk.&lt;br /&gt;&lt;br /&gt;It would be a tragedy if the first death by physical-digital convergence occurs because a &quot;security researcher&quot; is &quot;experimenting&quot; in order to demonstrate a proof of concept.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-6446549656920870297</guid>
         <pubDate>Tue, 21 Jul 2015 09:45:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-6cBRIAmpMPk/Va5Isq3wkhI/AAAAAAAALWU/ep3N4ycHk28/s72-c/jeep.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>C. Warren Axelrod:   Data Masking: Good … Information Masking: Very Bad</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/d5lyd84tgTo/</link>
         <description>As we learn more and more about the huge data breach of the U.S. Office of Personnel Management (OPM), two aspects are grabbing everyone’s attention. One is the weakness of the security measures implemented by OPM and its contractors; the other is that senior management of OPM and purportedly the Administration were not forthcoming in [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2609</guid>
         <pubDate>Mon, 20 Jul 2015 10:00:08 +0000</pubDate>
         <content:encoded><![CDATA[<p>As we learn more and more about the huge data breach of the U.S. Office of Personnel Management (OPM), two aspects are grabbing everyone’s attention. One is the weakness of the security measures implemented by OPM and its contractors; the other is that senior management of OPM and purportedly the Administration were not forthcoming in disclosing the scope of the leak.</p>
<p>Much of the blame for the data exfiltration has been assigned to OPM’s using an older version of Einstein, a government built intrusion detection system (IDS). Einstein’s the upgrade to an intrusion prevention system (IPS) has been hampered by delayed funding and approvals, according to the article “Breached Network’s Security is Criticized” by Damian Paletta on the front page of <strong><em>The Wall Street Journal </em></strong>of June 24, 2015. From my experience, the move from IDS to IPS is not a trivial exercise, since one needs to be careful not to block important messages. It takes time and expertise to fine-tune IPSs. However, the problems at OPM appear from reports to be much more extensive.</p>
<p>However, more importantly, no organization depends solely on IDS/IPS to manage its security. There is a whole range of measures, including strong, preferably two-factor, authentication, role-based authentication, and data masking. With data masking sensitive data fields are only made available (for read, write, and/or modify) to those with a need-to-know. The <strong><em>WSJ</em></strong> article also mentions separating data so that getting access to a single database does not reveal the whole picture of someone’s identity. This method has been discussed for some time, but is not trivial to implement. It first depends on precise data classification. Then the computer applications have to be designed to perform the complex operation of merging data and then breaking them apart. It is important to recognize that this method, along with encryption, is only effective for protecting raw data. If the attacker goes through an application with privileged access rights, then the system will bring together (and decrypt) the data and make the data available in aggregated (and cleartext) form. Believing that data aggregation and encryption are the answer is a myth of data protection held by many, including lawmakers.</p>
<p>The only approach that has a chance of working is a combination of effective IAM (Identity and Access Management) system, importantly including stringent registration procedures, and instrumenting applications so that you can actually know who is accessing and leaking what data in real time. The other stuff is nice to have, but doesn’t do much if the attacker steals legitimate credentials through spear-phishing or social-engineering means.</p>
<p>So &#8230; data masking is an important tool for ensuring that only those with a need-to-know see certain very sensitive information, but implementing data masking requires a strong understanding of what data are needed by whom and it can take a lot of programming work, especially with today’s integrated systems of systems.</p>
<p>The second issue is masking (or not disclosing) information so that the true extent of a breach is not made known to those affected and to the public at large. This could be a case of not actually knowing what was taken, although this does not appear to be the major issue in the OPM case as described in the article “Officials Masked Severity of Hack” by Devlin Barrett and Damian Paletta in the June 25, 2015 issue of <strong><em>The Wall Street Journal</em></strong>, where obfuscation appears to have been deliberate.</p>
<p>In many cases, an organization does not know what data were taken, when, and by whom. This is due to weak monitoring of networks and a lack of instrumentation within the applications. The former is relatively easy to fix—you just buy some products—but the latter takes a lot of work, especially if a software rewrite is needed. Of course, it is much better to include the need for instrumentation in requirements phase in the system development lifecycle, and carry those requirements through the design, development and testing phases. I wrote about this in an article “Creating Data from Applications for Detecting Stealth Attacks,” in the September/October 2011 issue of <strong><em>CrossTalk</em></strong> Journal, see <a rel="nofollow" target="_blank" href="http://static1.1.sqspcdn.com/static/f/702523/14121186/1315886331850/201109-Axelrod.pdf?token=0%2FFV5vW3t5qnshouG5UH3mKmNzE%3D">http://static1.1.sqspcdn.com/static/f/702523/14121186/1315886331850/201109-Axelrod.pdf?token=0%2FFV5vW3t5qnshouG5UH3mKmNzE%3D</a></p>
<p>When you look at all the things that need to be done, their cost, resources needed and time to implement, one might despair of any ability to close the flood gates or, unfortunately in many cases, the “barn door.” So, what is there left to do? If protection does not solve the short-term problem, then one is left with deterrence and avoidance. Deterrence in the cyber world is highly questionable, especially as attribution is fraught with errors &#8230; sources can be spoofed. Sanctions are not as effective for cyber warfare as they may be for kinetic wars.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/d5lyd84tgTo" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>C. Warren Axelrod:   Coding? OK … But Security? Ha!</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/TUAZu-JxyZI/</link>
         <description>Bloomberg Businessweek did something amazing. It devoted an entire double issue (June 5-28, 2015) to computer programming. Paul Ford’s 38,000-word essay “The Code Issue” describes the origins and history of computer programming and programming languages with the intention of educating those among us who never learned to write code and entertaining those of us who [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2605</guid>
         <pubDate>Mon, 06 Jul 2015 10:00:38 +0000</pubDate>
         <content:encoded><![CDATA[<p><strong><em>Bloomberg Businessweek</em></strong> did something amazing. It devoted an entire double issue (June 5-28, 2015) to computer programming. Paul Ford’s 38,000-word essay “The Code Issue” describes the origins and history of computer programming and programming languages with the intention of educating those among us who never learned to write code and entertaining those of us who did. At the end of the 112-page booklet, he asks the question “Should you learn to code?” and gives a variety of reasons to do so.</p>
<p>I ploughed through the article and found it quite informative. As someone whose first language was FORTRAN and who enjoyed programming in APL, I found it interesting to read Ford’s views and experiences. However, as an InfoSec professional, I was hugely disappointed at the lost opportunity to inform his presumably-large audience of the importance of secure coding and of the many vulnerabilities that are typically embedded in computer programs. In fact, there are only a couple of references to information security in the entire piece. One is about passwords, where he writes:</p>
<p>“We didn’t talk about password length, the number of letters and symbols necessary for passwords to be secure, or whether our password strategy on this site will fit in with the overall security profile of the company, which is the responsibility of a different division.”</p>
<p>Not my problem. Sounds like a cop-out to me.</p>
<p>The other mention of security is in regard to delays that a software project might experience:</p>
<p>“First, I needed to pass everything through the security team, which was five months of review &#8230;”</p>
<p>Right. Security is always the fall-guy when developers are looking for excuses as to why they are late with their projects. If they had built security in from the start there would have been minimal impact on the project’s timeline. Bolting security on once the programs are completed is always more expensive, less effective, and can cause inordinate delays.</p>
<p>Ford also waxes poetic about open-source software, but never mentions the Heartbleed and Shellshock fiascos &#8230; see my November 3, 2014 <strong><em>BlogInfoSec</em></strong> column “Heartbled and Shellshocked &#8230; What Can We Do?”</p>
<p>While the coding issue of <strong><em>Bloomberg Businessweek</em></strong> makes a heroic effort to bring knowledge of programming to the populace, it does everyone a disservice by not addressing information security and misses a wonderful opportunity for teaching the public of the importance of secure coding and security testing. As long as programmers’ prevalent view is that information security is someone else’s problem and that security reviews hamper project progress, we are not going to see very many applications that are secure, and cyber attacks will continue to be successful at an ever-increasing rate.</p>
<p>Oh, by the way, there is no need to spend $5.99 on a newsstand copy of the magazine, as I did. The complete issue is available free at <a rel="nofollow" target="_blank" href="http://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/">http://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/</a> in a more entertaining interactive version.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/TUAZu-JxyZI" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – June 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/sgJBFhR61bg/monthly-blog-round-up-june-2015.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current popularity of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. Succeeding with &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. That – and developing a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; is much harder than most people think&amp;nbsp; &lt;i&gt;[278 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;i&gt;[198 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;i&gt;[114 pageviews]&lt;/i&gt;  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;) &lt;i&gt;[100+ pageviews to the main tag]&lt;/i&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/04/on-choosing-siem.html&quot;&gt;On Choosing SIEM&lt;/a&gt;” is about &lt;em&gt;the least wrong way&lt;/em&gt; of choosing a SIEM tool – as well as why the right way is so unpopular. [60 pageviews out of a total of 4941 pageviews to all blog pages]&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br&gt;&lt;br&gt;&lt;strong&gt;Current research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/22/trouble-in-the-cloud/&quot;&gt;Trouble In The Cloud?!&lt;/a&gt;&lt;/div&gt;&lt;/li&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/26/cloud-security-monitoring-revisited-aka-it-is-not-2012-anymore-4/&quot;&gt;Cloud Security Monitoring … Revisited (aka It Is Not 2012 Anymore!)&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Past research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security analytics&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/08/my-demystifying-security-analytics-sources-methods-and-use-cases-paper-publishes/&quot;&gt;My “Demystifying Security Analytics: Sources, Methods and Use Cases” Paper Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/01/on-unknown-operational-effectiveness-of-security-analytics-tooling/&quot;&gt;On Unknown Operational Effectiveness of Security Analytics Tooling&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/10/now-that-we-have-all-that-data-what-do-we-do-revisited/&quot;&gt;Now That We Have All That Data What Do We Do, Revisited&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/06/who-validates-alerts-validated-by-your-alert-validator-software/&quot;&gt;Who Validates Alerts Validated by Your Alert Validator Software?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/03/killed-by-ai-much-a-rise-of-non-deterministic-security/&quot;&gt;Killed by AI Much? A Rise of Non-deterministic Security!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/siem-dlp-add-on-brain/&quot;&gt;SIEM / DLP Add-on Brain&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/19/those-pesky-users-how-to-catch-bad-usage-of-good-accounts/&quot;&gt;Those Pesky Users: How To Catch Bad Usage of Good Accounts&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/09/security-analytics-lessons-learned-and-ignored/&quot;&gt;Security Analytics Lessons Learned — and Ignored!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/03/security-analytics-projects-vs-boxes-built-vs-buy/&quot;&gt;Security Analytics: Projects vs Boxes (Build vs Buy)?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security Analytics – Finally Emerging For Real?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;br&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/24/enable-the-business-sometimes-security-must-say-no/&quot;&gt;Enable the Business? Sometimes Security Must Say “NO”…&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/06/11/once-more-on-insta-fail-security-policies-rant-alert/&quot;&gt;Once More on Insta-Fail Security Policies – Rant Alert!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/04/09/the-future-is-here-and-it-is-network-endpoint/&quot;&gt;The Future Is Here … And It Is … Network? Endpoint?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/all-my-research-published-in-2014/&quot;&gt;All My Research Published in 2014&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/06/monthly-blog-round-up-may-2015.html&quot;&gt;Monthly Blog Round-Up – May 2015&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=sgJBFhR61bg:zOr_YzUPZSc:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=sgJBFhR61bg:zOr_YzUPZSc:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=sgJBFhR61bg:zOr_YzUPZSc:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/sgJBFhR61bg&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-2272760645618106154</guid>
         <pubDate>Wed, 01 Jul 2015 15:09:50 +0000</pubDate>
      </item>
      <item>
         <title>Richard Bejtlich:   My Security Strategy: The &quot;Third Way&quot;</title>
         <link>http://taosecurity.blogspot.com/2015/06/my-security-strategy-third-way.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-0urDEeZhh98/VZLoWQYeHMI/AAAAAAAAK7w/3ujU5RDLCSk/s1600/hearing.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;210&quot; src=&quot;http://2.bp.blogspot.com/-0urDEeZhh98/VZLoWQYeHMI/AAAAAAAAK7w/3ujU5RDLCSk/s320/hearing.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Over the last two weeks I listened to and watched all of the hearings related to the OPM breach. During the exchanges between the witnesses and legislators, I noticed several themes. One presented the situation facing OPM (and other Federal agencies) as confronting the following choice:&lt;br /&gt;&lt;br /&gt;You can either 1) &quot;secure your network,&quot; which is very difficult and going to &quot;take years,&quot; due to &quot;years of insufficient investment,&quot; or 2) suffer intrusions and breaches, which is what happened to OPM.&lt;br /&gt;&lt;br /&gt;This struck me as an odd dichotomy. The reasoning appeared to be that because OPM did not make &quot;sufficient investment&quot; in security, a breach was the result.&lt;br /&gt;&lt;br /&gt;In other words, if OPM &lt;i&gt;had &lt;/i&gt;&quot;sufficiently invested&quot; in security, they would not have suffered a breach.&lt;br /&gt;&lt;br /&gt;I do not see the situation in this way, for two main reasons.&lt;br /&gt;&lt;br /&gt;First, there is a difference between an &quot;intrusion&quot; and a &quot;breach.&quot;&amp;nbsp;An intrusion is unauthorized access to a computing resource. A breach is the theft, alteration, or destruction of that computing resource, following an intrusion.&lt;br /&gt;&lt;br /&gt;It therefore follows that one can suffer an intrusion, but &lt;i&gt;not &lt;/i&gt;suffer a breach.&lt;br /&gt;&lt;br /&gt;One can avoid a breach following an intrusion if the security team can stop the adversary before he accomplishes his mission.&lt;br /&gt;&lt;br /&gt;Second, there is no point at which any network is &quot;secure,&quot; i.e., intrusion-proof. It is more likely one could operate a &lt;i&gt;breach-proof&lt;/i&gt; network, but that is not completely attainable, either.&lt;br /&gt;&lt;br /&gt;Still, the most effective strategy is a combination of preventing as many intrusions as possible, complemented by an aggressive detection and response operation that improves the chances of avoiding a breach, or at least minimizes the impact of a breach.&lt;br /&gt;&lt;br /&gt;This is why I call &quot;detection and response&quot; the &quot;third way&quot; strategy. The first way, &quot;secure your network&quot; by making it &quot;intrusion-proof,&quot; is not possible. The second way, suffer intrusions and breaches, is not acceptable. Therefore, organizations should implement a third way strategy that stops as many intrusions as possible, but detects and responds to those intrusions that do occur, prior to their progression to breach status.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-2431708208791798782</guid>
         <pubDate>Tue, 30 Jun 2015 15:23:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://2.bp.blogspot.com/-0urDEeZhh98/VZLoWQYeHMI/AAAAAAAAK7w/3ujU5RDLCSk/s72-c/hearing.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   My Prediction for Top Gun 2 Plot</title>
         <link>http://taosecurity.blogspot.com/2015/06/my-prediction-for-top-gun-2-plot.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-mZZTc-8TbCo/VZKnu-_eqEI/AAAAAAAAK6I/p9IXL9OuhxY/s1600/mav.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-mZZTc-8TbCo/VZKnu-_eqEI/AAAAAAAAK6I/p9IXL9OuhxY/s1600/mav.jpg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;We've known for about a year that Tom Cruise is returning to his iconic &quot;Maverick&quot; role from Top Gun, and that drone warfare would be involved. A few days ago we heard a few more details in this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://collider.com/top-gun-2-story-details-drone-warfare/&quot;&gt;Collider&lt;/a&gt; story:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;[Producer David Ellison]: There is an amazing role for Maverick in the movie and there is no Top Gun without Maverick, and it is going to be Maverick playing Maverick. It is I don’t think what people are going to expect, and we are very, very hopeful that we get to make the movie very soon. But like all things, it all comes down to the script, and Justin is writing as we speak.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;[Interviewer]; You’re gonna do what a lot of sequels have been doing now which is incorporate real use of time from the first one to now.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;ELLISON and DANA GOLDBERG: Absolutely...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;ELLISON:&amp;nbsp;&amp;nbsp;As everyone knows with Tom, he is 100% going to want to be in those airplanes shooting it practically. When you look at the world of dogfighting, what’s interesting about it is that it’s not a world that exists to the same degree when the original movie came out. This world has not been explored. It is very much a world we live in today where it’s drone technology and fifth generation fighters are really what the United States Navy is calling the last man-made fighter that we’re actually going to produce so it’s really exploring the end of an era of dogfighting and fighter pilots and what that culture is today are all fun things that we’re gonna get to dive into in this movie.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;What could the plot involve?&lt;br /&gt;&lt;br /&gt;First, who is the adversary? You can't have dogfighting without a foe. Consider the leading candidates:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Russia: Maybe. Nobody is fond of what President Putin is doing in Ukraine.&lt;/li&gt;&lt;li&gt;Iran: Possible, but Hollywood types are close to the Democrats, and they will not likely want to upset Iran if Secretary Kerry secures a nuclear deal.&lt;/li&gt;&lt;li&gt;China: No way. Studios want to release movies in China, and despite the possibility of aerial conflict in the East or South China Seas, no studio is going to make China the bad guy. In fact, the studio will want to promote China as a good guy to please that audience.&lt;/li&gt;&lt;li&gt;North Korea: No way. Prior to &quot;The Interview,&quot; this was a possibility. Not anymore!&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;My money is on an Islamic terrorist group, either unnamed, or possibly Islamic State. They don't have an air force, you say? This is where the drone angle comes into play.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Here is my prediction for the Top Gun 2 plot.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Oil tankers are trying to pass through the Gulf of Aden, or maybe the Strait of Hormuz, carrying their precious cargo. Suddenly a swarm of small, yet armed, drones attack and destroy the convoy, setting the oil ablaze in a commercial and environmental disaster. The stock market suffers a huge drop and gas prices skyrocket.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The US Fifth Fleet, and its Chinese counterpart, performing counter-piracy duties nearby, rush to rescue the survivors. They set up joint patrols to guard other commercial sea traffic. Later the Islamic group sends another swarm of drones to attack the American and Chinese ships. This time the enemy includes some sort of electronic warfare-capable drones that jam US and Chinese GPS, communications, and computer equipment. (I'm seeing a modern &quot;Battlestar Galactica&quot; theme here.) American and Chinese pilots die, and their ships are heavily damaged. (By the way, this is Hollywood, not real life.)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The US Navy realizes that its &quot;net-centric,&quot; &quot;technologically superior&quot; force can't compete with this new era of warfare. Cue the similarities with the pre-Fighter Weapons School, early Vietnam situation described in the first scenes at Miramar in the original movie. (Remember, a 12-1 kill ratio in Korea, 3-1 in early Vietnam due to reliance on missiles and atrophied dogfighting skills, back to 12-1 in Vietnam after Top Gun training?)&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;The US Navy decides it needs to bring back someone who thinks unconventionally in order to counter the drone threat and resume commercial traffic in the Gulf. They find Maverick, barely hanging on to a job teaching at a civilian flight school. His personal life is a mess, and he was kicked out of the Navy during the first Gulf War in 1991 for breaking too many rules. Now the Navy wants him to teach a new generation of pilots how to fight once their &quot;net-centric crutches&quot; disappear.&lt;br /&gt;&lt;br /&gt;You know what happens next. Maverick returns to the Navy as a contractor. Top Gun is now the Naval Strike and Air Warfare Center (NSAWC) at NAS Fallon, Nevada. The Navy retired his beloved F-14 in 2006, so there is a choice to be made about what aircraft awaits him in Nevada. I see three possibilities:&lt;br /&gt;&lt;br /&gt;1) The Navy resurrects the F-14 because it's &quot;not vulnerable&quot; to the drone electronic warfare. This would be cool, but they aren't going to be able to fly American F-14s due to their retirement. CGI maybe?&lt;br /&gt;&lt;br /&gt;2) The Navy flies the new F-35, because it's new and cool. However, the Navy will probably not have any to fly. CGI again?&lt;br /&gt;&lt;br /&gt;3) The Navy flies the F-18. This is most likely, because producers could film live operations as they did in the 1980s.&lt;br /&gt;&lt;br /&gt;Beyond the aircraft issues, I expect themes involving relevance as one ages, re-integration with military culture, and possibly friction between members of the joint US-China task force created to counter the Islamic threat.&lt;br /&gt;&lt;br /&gt;In the end, thanks to the ingenuity of Maverick's teaching and tactics, the Americans and Chinese prevail over the Islamic forces. It might require Maverick to make the ultimate sacrifice, showing he's learned that warfare is a team sport, and that he really misses Goose. The Chinese name their next aircraft carrier the &quot;Pete Mitchell&quot; in honor of Maverick's sacrifice. (Forget calling it the &quot;Maverick&quot; -- too much rebellion for the CCP.)&lt;br /&gt;&lt;br /&gt;I'm looking forward to this movie.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-6546831750786953153</guid>
         <pubDate>Tue, 30 Jun 2015 11:01:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-mZZTc-8TbCo/VZKnu-_eqEI/AAAAAAAAK6I/p9IXL9OuhxY/s72-c/mav.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Hearing Witness Doesn't Understand CDM</title>
         <link>http://taosecurity.blogspot.com/2015/06/hearing-witness-doesnt-understand-cdm.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-3t-mmm_3DR0/VY7AnV_WMwI/AAAAAAAAK5I/P5UnprVszs8/s1600/chs.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-3t-mmm_3DR0/VY7AnV_WMwI/AAAAAAAAK5I/P5UnprVszs8/s1600/chs.jpg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;This post is a follow up to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2015/06/continuous-diagnostic-monitoring-does.html&quot;&gt;this post on CDM&lt;/a&gt;. Since that post I have been watching hearings on the OPM breach.&lt;br /&gt;&lt;br /&gt;On Wednesday 24 June a Subcommittee of the House Committee on Homeland Security held a hearing titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://homeland.house.gov/hearing/subcommittee-hearing-dhs-efforts-secure-gov&quot;&gt;DHS’ Efforts to Secure .Gov&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;A second panel (starts in the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.ustream.tv/recorded/64752514&quot;&gt;Webcast&lt;/a&gt; around 2 hours 20 minutes) featured Dr.&amp;nbsp;Daniel M. Gerstein, a former DHS official now with RAND, as its sole witness.&lt;br /&gt;&lt;br /&gt;During his opening statement, and in his &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://docs.house.gov/meetings/HM/HM08/20150624/103698/HHRG-114-HM08-Wstate-GersteinD-20150624.pdf&quot;&gt;written testimony&lt;/a&gt;, he made the following comments:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&quot;The two foundational programs of DHS’s cybersecurity program are EINSTEIN (also called&amp;nbsp;&lt;/i&gt;&lt;i&gt;EINSTEIN 3A) and CDM. These two systems are designed to work in tandem, with EINSTEIN&amp;nbsp;&lt;/i&gt;&lt;i&gt;focusing on keeping threats out of federal networks and &lt;b&gt;CDM identifying them when they are&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;b&gt;&lt;i&gt;inside government networks.&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;EINSTEIN provides a perimeter around federal (or .gov) users, as well as select users in the .com&amp;nbsp;&lt;/i&gt;&lt;i&gt;space that have responsibility for critical infrastructure. EINSTEIN functions by installing sensors&amp;nbsp;&lt;/i&gt;&lt;i&gt;at Web access points and employs signatures to identify cyberattacks.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;CDM, on the other hand, is designed to provide an embedded system of sensors on internal&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;government networks. These sensors provide real-time capacity to sense anomalous behavior&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;and provide reports to administrators&lt;/b&gt; through a scalable dashboard. It is composed of&amp;nbsp;&lt;/i&gt;&lt;i&gt;commercial-off-the-shelf equipment coupled with a customized dashboard that can be scaled for&amp;nbsp;&lt;/i&gt;&lt;i&gt;administrators at each level.&quot; &lt;/i&gt;(emphasis added)&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;All of the text in bold is &lt;b&gt;false&lt;/b&gt;. CDM is &lt;b&gt;not&lt;/b&gt;&amp;nbsp;&quot;identifying [threats] when they are in inside government networks.&quot; CDM is&amp;nbsp;&lt;b&gt;not&lt;/b&gt;&amp;nbsp;&quot;an embedded system of sensors on internal government networks&quot; looking for threat actors.&lt;br /&gt;&lt;br /&gt;Why does Dr. Gerstein so misunderstand the CDM program? The answer is found in the next section of his testimony, reproduced below.&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&quot;CDM operates by providing&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;federal departments and agencies with capabilities and tools that identify&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;cybersecurity &lt;b&gt;risks &lt;/b&gt;on an ongoing basis, prioritize these &lt;b&gt;risks &lt;/b&gt;based upon&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;potential impacts, and enable cybersecurity personnel to mitigate the&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;most significant problems first. Congress established the CDM program&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;to provide adequate, risk-based, and cost-effective cybersecurity and&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;i&gt;more efficiently allocate cybersecurity resources.&quot;&lt;/i&gt; (emphasis added)&lt;br /&gt;&lt;br /&gt;The indented section is reproduced from the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dhs.gov/cdm&quot;&gt;DHS CDM Website&lt;/a&gt;, as footnoted in Dr. Gerstein's statement.&lt;br /&gt;&lt;br /&gt;The answer to my question of misunderstanding involves two levels of confusion.&lt;br /&gt;&lt;br /&gt;The first level of confusion is a result of the the CDM description, which confuses&amp;nbsp;&lt;b&gt;risks &lt;/b&gt;with &lt;b&gt;vulnerabilities&lt;/b&gt;. Basically, the CDM description should say &lt;b&gt;vulnerabilities &lt;/b&gt;instead of &lt;b&gt;risks&lt;/b&gt;. CDM, now known as Continuous Diagnostics and Mitigation, is a &quot;find and fix flaws (i.e., vulnerabilities) faster&quot; program.&lt;br /&gt;&lt;br /&gt;In other words, the CDM description should say:&lt;br /&gt;&lt;br /&gt;&quot;CDM gives federal departments and agencies with capabilities and tools that identify cybersecurity &lt;b&gt;vulnerabilities &lt;/b&gt;on an ongoing basis, prioritize these &lt;b&gt;vulnerabilities &lt;/b&gt;based upon potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first.&quot;&lt;br /&gt;&lt;br /&gt;The second level of confusion is a result of Dr. Gerstein confusing &lt;b&gt;risks &lt;/b&gt;with &lt;b&gt;threats&lt;/b&gt;. It is clear that when Dr. Gerstein reads the CDM description and its mention of &quot;risks,&quot; he thinks CDM is looking for &lt;b&gt;threat actors&lt;/b&gt;. CDM does not look for threat actors; CDM looks for vulnerabilities. Vulnerabilities are flaws in software or configuration that make it possible for intruders to gain unauthorized access.&lt;br /&gt;&lt;br /&gt;As I wrote in my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2015/06/continuous-diagnostic-monitoring-does.html&quot;&gt;CDM post&lt;/a&gt;, we absolutely need the capability to find and fix flaws faster. We need CDM. However, do not confuse CDM with the operational capability to detect and remove threat actors. CDM could be deployed across the entire Federal government, but it would be an accident if a security analyst noticed an intruder using a CDM tool.&lt;br /&gt;&lt;br /&gt;Essentially, the government needs to implement &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2015/06/my-federal-government-security-crash.html&quot;&gt;My Federal Government Security Crash Program&lt;/a&gt;&amp;nbsp;to detect and remove threat actors.&lt;br /&gt;&lt;br /&gt;It is critical that staffers, lawmakers, and the public understand what is happening, and not be lulled into a false sense of security due to misunderstanding these concepts.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-4339642064348965811</guid>
         <pubDate>Sat, 27 Jun 2015 11:50:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-3t-mmm_3DR0/VY7AnV_WMwI/AAAAAAAAK5I/P5UnprVszs8/s72-c/chs.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>C. Warren Axelrod:   FAA, GAO … Please Read My Book!</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/Yi8f9Awrjw8/</link>
         <description>&amp;#8230; and my articles, columns, etc. about the dangers of connecting information systems to control systems. The GAO (US Government Accountability Office) released an April 2015 report, GAO-15-370, on the cybersecurity of air traffic control and avionics systems, with the title “Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity as Agency [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2600</guid>
         <pubDate>Mon, 22 Jun 2015 10:00:53 +0000</pubDate>
         <content:encoded><![CDATA[<p>&#8230; and my articles, columns, etc. about the dangers of connecting information systems to control systems.</p>
<p>The GAO (US Government Accountability Office) released an April 2015 report, GAO-15-370, on the cybersecurity of air traffic control and avionics systems, with the title “Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity as Agency Transitions to NextGen,” which is available at <a rel="nofollow" target="_blank" href="http://www.gao.gov/assets/670/669627.pdf">http://www.gao.gov/assets/670/669627.pdf</a></p>
<p>The issue about malevolent individuals or terrorists hacking into air traffic and aircraft control systems has been discussed at length. The usual response is denial from the oversight agencies and contractors. Well, yes, researchers demonstrated that they could hack into avionics systems using a smart phone, but that, according to the FAA, EASA, Honeywell and Rockwell Collins, would not be feasible in “the real world” &#8230; see my April 21, 2014 <strong><em>BlogInfoSec</em></strong> column “It’s About Time … Tamper-Proofing Aircraft Systems” and also my prior April 10, 2013 <strong><em>BlogInfoSec</em></strong> column “Hacking Avionics Systems.”</p>
<p>So now that we have an authoritative view of the situation from the GAO, what should we do about it? In their report, the GAO first enumerates the following three cybersecurity challenge areas faced by the FAA:
<ol>
<li>protecting its air traffic control (ATC) information systems,</li>
<li>securing aircraft avionics used to operate and guide aircraft, and</li>
<li>clarifying cybersecurity roles and responsibilities among multiple FAA offices.</li>
</ol>
<p> The GAO then suggests that the Secretary of Transportation instruct the FAA to do the following:
<ul>
<li>As a first step to developing an agency-wide threat model, assess the potential cost and timetable for developing such a threat model and the resources required to maintain it.</li>
<li> Incorporate the Office of Safety into FAA’s agency-wide approach by including it on the Cybersecurity Steering Committee.</li>
<li>Given the challenges FAA faces in meeting OMB’s guidance to implement the latest security controls in NIST’s revised guidelines within one year of issuance, develop a plan to fund and implement the NIST revisions within OMB’s time frames.</li>
</ul>
<p> These are all worthwhile demands, but they are neither sufficiently comprehensive nor do they suggest the required level of urgency. The threats to and vulnerabilities of these systems are growing daily. Security guidelines need to be implemented today, if not sooner. Over the past several years, we have seen pilots replacing piles of paper for navigation information with tablets, with apparent fuel savings in the millions of dollars just from the reduced weight. At some point, these off-the-shelf systems will likely be connected to airplanes’ control systems. Sophisticated passengers, well versed in hacking methods, can supposedly gain access to aircraft flight management systems from ports under their seats. And who knows what well-funded nation states might be able to do?</p>
<p>In my book, “Engineering Safe and Secure Software Systems,” (Artech House, 2012), I specifically address issues that arise from combining security-critical information systems and safety-critical control systems. I describe in detail the development lifecycles of both security-critical and safety-critical cyber-physical systems and how both lifecycle processes must be brought together with expertise in both cybersecurity and system safety brought into the picture. It is now more than two years since my book was published and I wasn’t the first to raise these issues by any means.</p>
<p>What will it take to make all this a top priority and accelerate and expand these government efforts? Perhaps it has already happened. There was an accident on May 9, 2015 in which an Airbus A400M military cargo and troop transport plane crashed on a test flight resulting in the deaths of four persons. Several weeks later it was revealed that the crash was caused by faulty software installation, as described in Mike Wheatley’s article “Faulty Software Install Led to Airbus A400M Plane Crash,” in SiliconAngle, June 1, 2015 &#8230; see <a rel="nofollow" target="_blank" href="http://siliconangle.com/blog/2015/06/01/faulty-software-install-led-to-airbus-a400m-plane-crash/">http://siliconangle.com/blog/2015/06/01/faulty-software-install-led-to-airbus-a400m-plane-crash/</a></p>
<p>There have been other software failures in modern aircraft that fortunately didn’t lead to loss of life. Do we have to witness a major disaster before the authorities take this matter more seriously and place tighter deadlines on putting stringent security-safety measures in place? Implementing security controls “within one year of issuance” of NIST’s revised guidance isn’t good enough, by far. We need them now.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/Yi8f9Awrjw8" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   The Tragedy of the Bloomberg Code Issue</title>
         <link>http://taosecurity.blogspot.com/2015/06/the-tragedy-of-bloomberg-code-issue.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-vtOMGxA9Sts/VYVgSh1hrJI/AAAAAAAAK3o/yocOayeXg_A/s1600/IMG_0638.JPG&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://1.bp.blogspot.com/-vtOMGxA9Sts/VYVgSh1hrJI/AAAAAAAAK3o/yocOayeXg_A/s320/IMG_0638.JPG&quot; width=&quot;240&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Last week I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/taosecurity/status/609784091366584320&quot;&gt;Tweeted&lt;/a&gt; about the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/&quot;&gt;Bloomberg &quot;code&quot; issue&lt;/a&gt;. I said I didn't know how to think about it. The issue is a 28,000+ word document, enough to qualify as a book, that's been covered by news outlets like the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.huffingtonpost.com/2015/06/14/what-is-code_n_7576886.html&quot;&gt;Huffington Post&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I approached the document with an open mind. When I opened my mail box last week, I didn't expect to get a 112 page magazine devoted to explaining the importance of software to non-technical people. It was a welcome surprise.&lt;br /&gt;&lt;br /&gt;This morning I decided to try to read some of the issue. (It's been a busy week.) I opened the table of contents, shown at left. It took me a moment, but I realized none of the article titles mentioned security.&lt;br /&gt;&lt;br /&gt;Next I visited the online edition, which contains the entire print version and adds additional content. I searched the text for the word &quot;security.&quot; These are the results:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Security research specialists love to party.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;I have been asked if I was physical security (despite security wearing very distinctive uniforms),” wrote Erica Joy Baker on Medium.com who has worked, among other places, at Google.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Can we not rathole on Mailinator before we talk overall security?&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;We didn’t talk about password length, the number of letters and symbols necessary for passwords to be secure, or whether our password strategy on this site will fit in with the overall security profile of the company, which is the responsibility of a different division.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Ditto many of the security concerns that arise when building websites, the typical abuses people perpetrate.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;“First, I needed to pass everything through the security team, which was five months of review,” TMitTB says, “and then it took me weeks to get a working development environment, so I had my developers sneaking out to Starbucks to check in their code. …”&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;In Fortran, and I ask to see your security clearance.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;If you're counting, that's eight instances of &quot;security&quot; in seven sentences. There's no mention of &quot;software security.&quot; There's a small discussion about &quot;e-mail validation,&quot; but it's printed to show how broken software development meetings can be.&lt;br /&gt;&lt;br /&gt;Searching for &quot;hack&quot; yields two references to &quot;Hacker News&quot; and this sentence talking about the perils of the PHP programming language:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Everything was always broken, and people were always hacking into my sites.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;There is one result for &quot;breach,&quot; but it has nothing to do with security incidents. The only time the word &quot;incident&quot; appears is in a sentence talking about programming conference attendees behaving badly.&lt;br /&gt;&lt;br /&gt;In brief, a 112 page magazine devoted to the importance of software has absolutely nothing useful to say about software security. Arguably, it says absolutely nothing on software security.&lt;br /&gt;&lt;br /&gt;When someone communicates, what he or she doesn't say can be as important as what he or she does say.&lt;br /&gt;&lt;br /&gt;In the case of this magazine, it's clear that software security is not on the minds of the professional programmer who wrote the issue. It's also not a concern of the editor or any of the team that contributed to it.&lt;br /&gt;&lt;br /&gt;From what I have seen, that neglect is not unique to Bloomberg.&lt;br /&gt;&lt;br /&gt;That is the tragedy of the Bloomberg code issue, and it remains a contributing factor to the decades of breaches we have been suffering.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-2718800526026240662</guid>
         <pubDate>Sat, 20 Jun 2015 09:13:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-vtOMGxA9Sts/VYVgSh1hrJI/AAAAAAAAK3o/yocOayeXg_A/s72-c/IMG_0638.JPG" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Air Force Enlisted Ratings Remain Dysfunctional</title>
         <link>http://taosecurity.blogspot.com/2015/06/air-force-enlisted-ratings-remain.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-yz7DezNJnHs/VYSo-y9e0AI/AAAAAAAAK3Q/bqixdUOfTNY/s1600/f5.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;207&quot; src=&quot;http://1.bp.blogspot.com/-yz7DezNJnHs/VYSo-y9e0AI/AAAAAAAAK3Q/bqixdUOfTNY/s320/f5.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I just read&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.airforcetimes.com/story/military/2015/06/19/firewall-5s-are-history-quotas-for-top-ratings-announced/28975691/&quot;&gt;Firewall 5s are history: Quotas for top ratings announced&lt;/a&gt; in Air Force Times. It describes an effort to eliminate the so-called &quot;firewall 5&quot; policy with a new &quot;forced distribution&quot; approach:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The Air Force's &lt;b&gt;old enlisted promotion system&lt;/b&gt; was heavily criticized by airmen for out-of-control grade inflation that came with its five-point numerical rating system. There were no limits on how many airmen could get the maximum: five out of five points [aka &quot;firewall 5&quot;]. &lt;b&gt;As a result nearly everyone got a 5 rating.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;As more and more raters gave their airmen 5s on their EPR [&amp;nbsp;Enlisted Performance Report], the firewall 5 became a common occurrence received by some 90 percent of airmen. And this meant the old EPR was effectively useless at trying to differentiate between levels of performance...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Under the new system, [Brig. Gen. Brian Kelly, director of military force management policy]&amp;nbsp;said in a June 12 interview at the Pentagon, the numerical ratings are gone — and firewall 5s will be impossible...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;The quotas — or as the Air Force calls them, &quot;forced distribution&quot;&lt;/b&gt; — will be one of the final elements to be put in place in the service's massive overhaul of its enlisted promotion process, which has been in the works &lt;b&gt;for three years&lt;/b&gt;...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Only the top 5 percent, at most, of senior airmen, staff sergeants and technical sergeants who are up for promotion to the next rank will be deemed &quot;promote now&quot;&lt;/b&gt; and get the full 250 EPR points...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;The quotas for the next tier of airmen — who will be deemed &quot;must promote&quot; and will get 220 out of 250 EPR points — will differ based on their rank. Kelly said that up to 15 percent of senior airmen who are eligible for promotion to staff sergeant can receive a &quot;must promote&quot; rating, and up to 10 percent of staff sergeants and tech sergeants up for promotion to technical and master sergeant can get that rating, and the accompanying 220 points.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;The next three ratings — &quot;promote,&quot; &quot;not ready now&quot; and &quot;do not promote&quot; — will each earn airmen 200, 150 and 50 points, respectively. But there will be no limit on how many airmen can get those ratings. (emphasis added)&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;I am not an expert on the enlisted performance rating system. In some ways, I think the EPR is superior to the corresponding system for officers, because enlisted personnel take tests whose scores influence their promotion potential.&lt;br /&gt;&lt;br /&gt;However, upon reading this story, it reminded me of my 2012 post &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2012/07/how-to-kill-teams-through-stack-ranking.html&quot;&gt;How to Kill Teams Through &quot;Stack Ranking&quot;&lt;/a&gt;, which cited a Vanity Fair article about Microsoft's old promotion system:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;[Author Kurt] Eichenwald’s conversations reveal that a management system known as “stack ranking” — a program that &lt;b&gt;forces every unit to declare a certain percentage of employees as top performers, good performers, average, and poor — effectively crippled Microsoft’s ability to innovate.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;“Every current and former Microsoft employee I interviewed — every one — cited stack ranking as &lt;b&gt;the most destructive process inside of Microsoft, something that drove out untold numbers of employees&lt;/b&gt;,” Eichenwald writes.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;This sounds uncomfortably like the new Air Force enlisted &quot;forced distribution&quot; system.&lt;br /&gt;&lt;br /&gt;I was also reminded of another of my 2012 posts,&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2012/06/bejtlichs-thoughts-on-why-our-best.html&quot;&gt;Bejtlich's Thoughts on &quot;Why Our Best Officers Are Leaving&quot;&lt;/a&gt;, which stressed the finding that&lt;br /&gt;&lt;br /&gt;&lt;i&gt;[V]eterans were shocked to look back at how “archaic and arbitrary” talent management was in the armed forces. Unlike industrial-era firms, and unlike the military, successful companies in the knowledge economy understand that &lt;b&gt;nearly all value is embedded in their human capital&lt;/b&gt;. (emphasis added)&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;I am sure the Air Force is doing what it thinks is right by changing the EPR system. However, it's equivalent to making changes in a centrally planned economy, without abandoning central planning.&lt;br /&gt;&lt;br /&gt;It's time the Air Force, and the rest of the military, discard their centrally-planned, promote-the-paper (instead of the person), involuntary assignment process.&lt;br /&gt;&lt;br /&gt;In its place I recommend one that openly and competitively advertises and offers positions; gives pay, hiring, and firing authority to the local manager; and adopts similar aspects of sound private sector personnel management.&lt;br /&gt;&lt;br /&gt;Today's knowledge economy demands that military personnel be treated as unique individuals, not industrial age interchangeable parts. Our military talent is one of the few competitive advantages we possess over peer rivals. We must not squander it with dysfunctional promotion systems.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-5879619442330582634</guid>
         <pubDate>Fri, 19 Jun 2015 20:08:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-yz7DezNJnHs/VYSo-y9e0AI/AAAAAAAAK3Q/bqixdUOfTNY/s72-c/f5.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Redefining Breach Recovery</title>
         <link>http://taosecurity.blogspot.com/2015/06/redefining-breach-recovery.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-qohm4AlQH1Q/VXyVs8fxvkI/AAAAAAAAK2U/4tZDEM0isPU/s1600/SampleSSN_1.gif&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;198&quot; src=&quot;http://2.bp.blogspot.com/-qohm4AlQH1Q/VXyVs8fxvkI/AAAAAAAAK2U/4tZDEM0isPU/s320/SampleSSN_1.gif&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;For too long, the definition of &quot;breach recovery&quot; has focused on returning information systems to a trustworthy state. The purpose of an incident response operation was to scope the extent of a compromise, remove the intruder if still present, and return the business information systems to pre-breach status. This is completely acceptable from the point of view of the computing architecture.&lt;br /&gt;&lt;br /&gt;During the last ten years we have witnessed an evolution in thinking about the likelihood of breaches. When I published my first book in 2004, critics complained that my &quot;assumption of breach&quot; paradigm was defeatist and unrealistic. &quot;Of course you could keep intruders out of the network, if you combined the right controls and technology,&quot; they claimed. A decade of massive breaches have demonstrated that preventing all intrusions is impossible, given the right combination of adversary skill and persistence, and lack of proper defensive strategy and operations.&lt;br /&gt;&lt;br /&gt;We need to now move beyond the arena of breach recovery as a technical and computing problem. Every organization needs to think about how to recover the interests of its constituents, should the organization lose their data to an adversary. Data custodians need to change their business practices such that breaches are survivable from the perspective of the constituent. (By constituent I mean customers, employees, partners, vendors -- anyone dependent upon the practices of the data custodian.)&lt;br /&gt;&lt;br /&gt;Compare the following scenarios.&lt;br /&gt;&lt;br /&gt;If an intruder compromises your credit card, it is fairly painless for a consumer to recover. There is a $50 or less financial penalty. The bank or credit card company handles replacing the card. Credit monitoring and related services are generally adequate for limiting damage. Your new credit card is as functional as the old credit card.&lt;br /&gt;&lt;br /&gt;If an intruder compromises your Social Security number, recovery may not be possible. The financial penalties are unbounded. There is no way to replace a stolen SSN. Credit monitoring and related services can only alert citizens to derivative misuse, and the victim must do most of the work to recover -- if possible. The citizen is at risk wherever other data custodians rely on SSNs for authentication purposes.&lt;br /&gt;&lt;br /&gt;This SSN situation, and others, must change. All organizations who act as data custodians must evaluate the data in their control, and work to improve the breach recovery status for their constituents. For SSNs, this means eliminating their secrecy as a means of authentication. This will be a massive undertaking, but it is necessary.&lt;br /&gt;&lt;br /&gt;It's time to redefine what it means to recover from a breach, and put constituent benefit at the heart of the matter, where it belongs.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-8256276162753197119</guid>
         <pubDate>Sat, 13 Jun 2015 16:56:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://2.bp.blogspot.com/-qohm4AlQH1Q/VXyVs8fxvkI/AAAAAAAAK2U/4tZDEM0isPU/s72-c/SampleSSN_1.gif" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   My Federal Government Security Crash Program</title>
         <link>http://taosecurity.blogspot.com/2015/06/my-federal-government-security-crash.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-ELWQoGb2xDE/VXi-wztw1AI/AAAAAAAAK1c/NBAStk1Rnu4/s1600/fed.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;239&quot; src=&quot;http://3.bp.blogspot.com/-ELWQoGb2xDE/VXi-wztw1AI/AAAAAAAAK1c/NBAStk1Rnu4/s320/fed.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;In the wake of recent intrusions into government systems, multiple parties have been asking for my recommended courses of action.&lt;br /&gt;&lt;br /&gt;In 2007, following public reporting on the 2006 State Department breach, I blogged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2007/04/when-fisma-bites.html&quot;&gt;When FISMA Bites&lt;/a&gt;,&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2007/04/initial-thoughts-on-digital-security.html&quot;&gt;Initial Thoughts on Digital Security Hearing&lt;/a&gt;. and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2007/04/what-should-feds-do.html&quot;&gt;What Should the Feds Do&lt;/a&gt;. These posts captured my thoughts on the government's response to the State Department intrusion.&lt;br /&gt;&lt;br /&gt;The situation then mirrors the current one well: outrage over an intrusion affecting government systems, China suspected as the culprit, and questions regarding why the government's approach to security does not seem to be working.&lt;br /&gt;&lt;br /&gt;Following that breach, the State Department hired a new CISO who pioneered the &quot;continuous monitoring&quot; program, now called &quot;Continuous Diagnostic Monitoring&quot; (CDM). That CISO eventually left State for DHS, and brought CDM to the rest of the Federal government. He is now retired from Federal service, but CDM remains. Years later we're reading about another breach at the State Department, plus the recent OPM intrusions. CDM is not working.&lt;br /&gt;&lt;br /&gt;My last post,&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2015/06/continuous-diagnostic-monitoring-does.html&quot;&gt;Continuous Diagnostic Monitoring Does Not Detect Hackers&lt;/a&gt;, explained that although CDM is a necessary part of a security program, it should not be the priority. CDM is at heart a &quot;Find and Fix Flaws Faster&quot; program. We should not prioritize closing and locking doors and windows while there are intruders in the house. Accordingly, I recommend a &quot;Detect and Respond&quot; strategy first and foremost.&lt;br /&gt;&lt;br /&gt;To implement that strategy, I recommend the following, three-phase approach. All phases can run concurrently.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Phase 1: Compromise Assessment&lt;/u&gt;:&lt;/b&gt; Assuming the Federal government can muster the motivation, resources, and authority, the Office of Management and Budget (OMB), or another agency such as DHS, should implement a government-wide &lt;i&gt;compromise assessment&lt;/i&gt;. The compromise assessment involves deploying teams across government networks to perform point-in-time &quot;hunting&quot; missions to find, and if possible, remove, intruders. I suspect the &quot;remove&quot; part will be more than these teams can handle, given the scope of what I expect they will find. Nevertheless, simply finding all of the intruders, or a decent sample, should inspire additional defensive activities, and give authorities a true &quot;score of the game.&quot;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Phase 2: Improve Network Visibility&lt;/u&gt;:&lt;/b&gt;&amp;nbsp;The following five points include actions to gain enhanced, enduring, network-centric visibility on Federal networks. While network-centric approaches are not a panacea, they represent one of the best balances between cost, effectiveness, and minimized disruption to business operations.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1. Accelerate the deployment of Einstein 3A, to instrument all Federal network gateways.&lt;/b&gt; Einstein is not the platform to solve the Federal government's network visibility problem, but given the current situation, some visibility is better than no visibility. If the inline, &quot;intrusion prevention system&quot; (IPS) nature of Einstein 3A is being used as an excuse for slowly deploying the platform, then the IPS capability should be disabled and the &quot;intrusion detection system&quot; (IDS) mode should be the default. Waiting until the end of 2016 is not acceptable. Equivalent technology should have been deployed in the late 1990s.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2. Ensure DHS and US-CERT have the authority to provide centralizing monitoring of all deployed Einstein sensors.&lt;/b&gt;&amp;nbsp;I imagine bureaucratic turf battles may have slowed Einstein deployment. &quot;Who can see the data&quot; is probably foremost among agency worries. DHS and US-CERT should be the home for centralized analysis of Einstein data. Monitored agencies should also be given access to the data, and DHS, US-CERT, and agencies should begin a dialogue on whom should have ultimately responsibility for acting on Einstein discoveries.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3. Ensure DHS and US-CERT are appropriately staffed to operate and utilize Einstein.&lt;/b&gt;&amp;nbsp;Collected security data is of marginal value if no one is able to analyze, escalate, and respond to the data. DHS and US-CERT should set expectations for the amount of time that should elapse from the time of collection to the time of analysis, and staff the IR team to meet those requirements.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4. Conduct hunting operations to identify and remove threat actors already present in Federal networks.&lt;/b&gt; Now we arrive at the heart of the counter-intrusion operation. The purpose of improving network visibility with Einstein (for lack of an alternative at the moment) is to find intruders and eliminate them. This operation should be conducted in a coordinated manner, not in a whack-a-mole fashion that facilitates adversary persistence. This should be coordinated with the &quot;hunt&quot; mission in Phase 1.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;5. Collect metrics on the nature of the counter-intrusion campaign and devise follow-on actions based on lessons learned.&lt;/b&gt;&amp;nbsp;This operation will teach Federal network owners lessons about adversary campaigns and the unfortunate realities of the state of their enterprise. They must learn how to improve the speed, accuracy, and effectiveness of their defensive campaign, and how to prioritize countermeasures that have the greatest impact on the opponent. I expect they would begin considering additional detection and response technologies and processes, such as enterprise log management, host-based sweeping, modern inspection platforms with virtual execution and detonation chambers, and related approaches.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Phase 3. Continuous Diagnostic Monitoring, and Related Ongoing Efforts&lt;/u&gt;:&lt;/b&gt;&amp;nbsp;You may be surprised to see that I am not calling for an end to CDM. Rather, CDM should not be the focus of Federal security measures. It is important to improve Federal security through CDM practices, such that it becomes more difficult for adversaries to gain access to government computers. I am also a fan of the Trusted Internet Connection program, whereby the government is consolidating the number of gateways to the Internet.&lt;br /&gt;&lt;br /&gt;Note: I recommend anyone interested in details on this matter see my latest book, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://nostarch.com/nsm&quot;&gt;The Practice of Network Security Monitoring&lt;/a&gt;, especially chapter 9. In that chapter I describe how to run a network security monitoring operation, based on my experiences since the late 1990s.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-3009984744141351924</guid>
         <pubDate>Wed, 10 Jun 2015 19:52:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-ELWQoGb2xDE/VXi-wztw1AI/AAAAAAAAK1c/NBAStk1Rnu4/s72-c/fed.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Continuous Diagnostic Monitoring Does Not Detect Hackers</title>
         <link>http://taosecurity.blogspot.com/2015/06/continuous-diagnostic-monitoring-does.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-NKJpBPyyaDQ/VXblaWgHb_I/AAAAAAAAK1A/Go2UFVpR39s/s1600/cdm01.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://3.bp.blogspot.com/-NKJpBPyyaDQ/VXblaWgHb_I/AAAAAAAAK1A/Go2UFVpR39s/s320/cdm01.jpg&quot; width=&quot;289&quot;/&gt;&lt;/a&gt;&lt;/div&gt;There is a dangerous misconception coloring the digital security debate in the Federal government. During the last week, in the wake of the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.opm.gov/news/latest-news/announcements/frequently-asked-questions/&quot;&gt;breach&lt;/a&gt; at the Office of Personnel Management (OPM), I have been discussing countermeasures with many parties. Concerned officials, staffers, and media have asked me about the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dhs.gov/publication/einstein-3-accelerated&quot;&gt;Einstein&lt;/a&gt; and&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.us-cert.gov/cdm&quot;&gt;Continuous Diagnostic Monitoring&lt;/a&gt;&amp;nbsp;(CDM) programs. It has become abundantly clear to me that there is a fundamental misunderstanding about the nature of CDM. This post seeks to remedy that problem.&lt;br /&gt;&lt;br /&gt;The story&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://thehill.com/policy/cybersecurity/244365-federal-cyber-protection-knocked-as-outdated-behind-schedule&quot;&gt;Federal cyber protection knocked as outdated, behind schedule&lt;/a&gt; by Cory Bennett unfortunately encapsulates the misunderstanding about Einstein and CDM:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The main system used by the federal government to protect sensitive  data from hacks has been plagued by delays and criticism that it is  already outdated — months before it is even fully implemented.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;The &lt;b&gt;Einstein system is intended to repel cyberattacks&lt;/b&gt; like the one revealed last week by the Office of Personnel Management (OPM)...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Critics say Einstein has been a multibillion-dollar boondoggle that is  diverting attention away from the security overhaul that is needed...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;To offset those shortcomings&lt;/b&gt;, officials in recent years started rolling  out a &lt;b&gt;&lt;u&gt;Continuous Diagnostics and Mitigation (CDM) program, which  searches for nefarious actors once they’re already in the networks. &lt;/u&gt;&lt;/b&gt;It’s  meant to complement and eventually integrate with Einstein. &lt;/i&gt;(emphasis added)&lt;br /&gt;&lt;br /&gt;The section I bolded and underlined is 100% false. CDM does &lt;b&gt;not&lt;/b&gt;&amp;nbsp;&quot;search&quot; for &quot;nefarious actors&quot; &quot;in the networks.&quot; CDM is a &lt;b&gt;vulnerability management program.&lt;/b&gt;&amp;nbsp;Please see the figure at the upper left. It depicts the six phases of the CDM program:&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Install/update &quot;sensors.&quot; (More on this shortly)&lt;/li&gt;&lt;li&gt;Automated search for &lt;b&gt;flaws&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;Collect results from departments and agencies.&lt;/li&gt;&lt;li&gt;Triage and analyze results.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Fix &lt;/b&gt;worst &lt;b&gt;flaws&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;Report progress.&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;CDM searches for &lt;b&gt;flaws&lt;/b&gt;&amp;nbsp;(i.e., vulnerabilities), and Federal IT workers are supposed to then &lt;b&gt;fix the flaws&lt;/b&gt;. The &quot;sensors&quot; mentioned in step 1 are vulnerability management and discovery platforms. They are not searching for intruders. You could be forgiven for misunderstanding what &quot;sensor&quot; means. Consider the following from the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dhs.gov/cdm&quot;&gt;DHS CDM&lt;/a&gt; page:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;i&gt;The CDM program enables government entities to expand their continuous diagnostic capabilities by increasing their &lt;b&gt;network sensor capacity&lt;/b&gt;, automating sensor collections, and prioritizing risk alerts.&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;Again, &quot;sensor&quot; here does not mean &quot;sensing&quot; to find intruders. The next paragraph says:&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;CDM offers commercial off-the-shelf (COTS) tools, with robust terms for technical modernization as threats change. First, agency-installed sensors perform an automated &lt;b&gt;search for known cyber flaws.&lt;/b&gt; Results feed into a local dashboard that produces customized reports, alerting network managers to their worst and most critical cyber risks based on standardized and weighted risk scores. Prioritized alerts enable agencies to efficiently allocate resources based on the severity of the risk. Progress reports track results, which can be used to compare security posture among department/agency networks. &amp;nbsp;Summary information can feed into an enterprise-level dashboard to inform and &lt;b&gt;situational awareness&lt;/b&gt; into cybersecurity risk posture across the federal government.&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The &quot;situational awareness&quot; here means &lt;b&gt;configuration and patch status,&lt;/b&gt; not &lt;b&gt;intrusion &lt;/b&gt;status.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I captured the CMD figure from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.us-cert.gov/sites/default/files/cdm_files/CDM_ProgramOverview.pdf&quot;&gt;US-CERT's Continuous Diagnostic Monitoring program overview&lt;/a&gt; (pdf). It also appears on the DHS CDM page. The US-CERT&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.us-cert.gov/cdm&quot;&gt;program Web page&lt;/a&gt; lists the core tools used for CDM as the following:&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Intro to &lt;u&gt;Hardware Asset Management&lt;/u&gt; (HWAM)&lt;/li&gt;&lt;li&gt;Intro to &lt;u&gt;Software Asset Management&lt;/u&gt; (SWAM)&lt;/li&gt;&lt;li&gt;Intro to &lt;u&gt;Vulnerability Management &lt;/u&gt;(VUL)&lt;/li&gt;&lt;li&gt;Intro to &lt;u&gt;Configuration Settings Management&lt;/u&gt; (CSM)&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;As you can see, CDM is about managing infrastructure, not detecting and responding to intruders. Don't be fooled by the &quot;monitoring&quot; in the term CDM; &quot;monitoring&quot; here means looking for flaws.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In contrast, Einstein is an intrusion detection and prevention platform. It is a network-based system that uses threat signatures to identify indications of compromise observable in network traffic. Einstein 1 and 2 were more like traditional IDS technologies, while Einstein 3 and 3 accelerated are more like IDP technologies.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Critics of my characterization might say &quot;CDM is more than faster patching.&quot; According to the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gsa.gov/portal/content/177887&quot;&gt;GSA page on CDM&lt;/a&gt;, CDM as I described earlier is only phase 1:&lt;/div&gt;&lt;div&gt;Endpoint Integrity&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;HWAM – Hardware Asset Management&lt;/li&gt;&lt;li&gt;SWAM – Software Asset Management&lt;/li&gt;&lt;li&gt;CSM – Configuration Settings Management&lt;/li&gt;&lt;li&gt;VUL – Vulnerability Management&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Phase 2 will include the following:&lt;/div&gt;&lt;div&gt;Least Privilege and Infrastructure Integrity&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;TRUST –Access Control Management (Trust in People Granted Access)&lt;/li&gt;&lt;li&gt;BEHAVE – Security-Related Behavior Management&lt;/li&gt;&lt;li&gt;CRED – Credentials and Authentication Management&lt;/li&gt;&lt;li&gt;PRIV – Privileges&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Phase 3 will include the following:&lt;/div&gt;&lt;div&gt;Boundary Protection and Event Management for Managing the Security Lifecycle&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Plan for Events&lt;/li&gt;&lt;li&gt;Respond to Events&lt;/li&gt;&lt;li&gt;Generic Audit/Monitoring&lt;/li&gt;&lt;li&gt;Document Requirements, Policy, etc.&lt;/li&gt;&lt;li&gt;Quality Management&lt;/li&gt;&lt;li&gt;Risk Management&lt;/li&gt;&lt;li&gt;Boundary Protection – Network, Physical, Virtual&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;What do you not see listed in any of these phases? Aside from &quot;respond to events,&quot; which does not appear to mean intrusions, I still see no strong focus on &lt;b&gt;detecting and responding to intrusions.&lt;/b&gt;&amp;nbsp;CDM beyond phase 1 is still just dealing with &quot;cyber hygiene.&quot; Unfortunately, even the President does not have the proper strategic focus. As reported by the Hill:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;President Obama acknowledged that one of the United States’s problems is that it has a “very old system.”&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;i&gt;“What we are doing is going agency by agency and &lt;b&gt;figuring out what can we fix with better practices and better computer hygiene&lt;/b&gt; by personnel, and where do we need new systems and new infrastructure in order to protect information,”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Don't misunderstand my criticism of CDM as praise for Einstein. At the very least, Einstein, or a technology like it, should have been deployed across the Federal government while I was still in uniform, 15 years ago. We had equivalent technology in the Air Force 20 years ago. (See the foreword for my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.nostarch.com/nsm&quot;&gt;latest book&lt;/a&gt; online for history.)&lt;br /&gt;&lt;br /&gt;Furthermore, I'm not saying that CDM is a bad approach. All of the CDM phases are needed. I understand that intruders are going to have an easy time getting back into a poorly secured network.&lt;br /&gt;&lt;br /&gt;My goal with this post is to show that CDM is either being sold as, or misunderstood as, a way to detect intruders. &lt;b&gt;CDM is not an intrusion detection program&lt;/b&gt;; CDM is a vulnerability management program, a method to &lt;i&gt;Find and Fix Flaws Faster&lt;/i&gt;. CDM should have been called &quot;F^4, F4, or 4F&quot; to capture this strategic approach.&lt;br /&gt;&lt;br /&gt;The focus on CDM has meant intruders already present in Federal networks are left to steal and fortify their positions, while scarce IT resources are devoted to patching. The Feds are identifying and locking doors and windows while intruders are inside the house.&lt;br /&gt;&lt;br /&gt;It's time for a new (yet ideologically very old) strategy: find the intruders in the network, remove them, and then conduct counter-intrusion campaigns to stop them from accomplishing their mission when they inevitably return. CDM is the real &quot;multibillion-dollar boondoggle that is diverting attention away from the security overhaul that is needed.&quot; The OPM breach is only the latest consequence of the misguided CDM-centric strategy.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-1635849677876974419</guid>
         <pubDate>Tue, 09 Jun 2015 09:54:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-NKJpBPyyaDQ/VXblaWgHb_I/AAAAAAAAK1A/Go2UFVpR39s/s72-c/cdm01.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>C. Warren Axelrod:   Big, Small and Personal Data</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/qpHnG9AblXE/</link>
         <description>There have been many articles of late bemoaning the fact that personal data are being collected in ever-vaster amounts and being analyzed to build broader profiles of each and every one of us that lead to targeted marketing and fraudulent activities. There have been many questions raised about how revealing some of those data might [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2595</guid>
         <pubDate>Mon, 08 Jun 2015 10:00:53 +0000</pubDate>
         <content:encoded><![CDATA[<p>There have been many articles of late bemoaning the fact that personal data are being collected in ever-vaster amounts and being analyzed to build broader profiles of each and every one of us that lead to targeted marketing and fraudulent activities. There have been many questions raised about how revealing some of those data might be, particularly concerning meta data.</p>
<p>There have also been concerns voiced over the accuracy of such data and whether we might be inappropriately categorized to our detriment. In fact, this was a question that was asked during my lecture on “The Fall of Privacy &#8230; and the Rise of Anonymity” on May 8, 2015, which I presented as one of the Technology and Policy Speakers Series talks at Stony Brook University.</p>
<p>My response to the question was that the high proportion of inaccurate personal data is indeed a major issue and that many of us suffer at some level or other as a consequence. The problem is not resolvable unless we are aware of the misrepresentations, and we are unlikely to become aware until either something bad happens or unless we are given legally-mandated access to our own personal data and with the ability to correct them, which has been a requirement in the European Union for 20 years under their 1995 Data Protection Directive.</p>
<p>Because of the vastness of big personal data banks, it is highly unlikely that false and inaccurate data will be corrected unless there are mechanisms that provide the ability to detect questionable data and fix them. On that score, there was a thought-provoking article, with the title “How Not to Drown in Numbers,” in the May 2, 2015 <strong><em>Sunday Review</em></strong> section of <strong><em>The New York Times</em></strong> by Alex Peysakhovich, who is a behavioral economist and data scientist at Facebook, and Seth Stevens-Davidowitz, who is an economist,.</p>
<p>Peysakhovich and Stevens-Davidowitz’s article points out that, while the use of big data is “amazing” for (say) detecting “whether a picture has a cat in it,” it is “not enough” for “important decisions about your health, wealth or happiness.” To counter this deficiency, the authors recommend supplementing big data with small data in order to “contextualize” the data. That is to say, through the use of surveys, analysts can begin to understand the true meaning of the data.</p>
<p>I recall a situation early in my career where we were analyzing the likelihood that aging credit card accounts would eventually be paid. The sophisticated statistical tools provided minimal help. I requested more information as to why cardholders were not paying, such as delinquency, criminal behavior, questions about the validity of some charges, or the demise of the cardholder. Unfortunately, this information was not to be had, so the statistical analysis remained relatively ineffective.</p>
<p>This brings us back to personal data in general. As with so much in data and metrics, the easy-to-collect stuff (i.e., big data) provides the basis for most decisions. The relatively more difficult-to-collect and costlier stuff (i.e., small data) is frequently ignored because of the relatively high data collection cost of surveys and the need for higher-paid specialists to analyze and understand the small data. When it comes to personal data, not only is the collection of big data fraught with accuracy problems but also the use of resulting analysis in making momentous life-affecting decisions, such as granting insurance or a mortgage, might be based on false information.</p>
<p>Unfortunately we seem to be going down the path of bigger and bigger data and less and less understanding of those data. That does not bode well for our society which is increasingly dependent on data regardless of their accuracy or completeness.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/qpHnG9AblXE" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – May 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/KQULOKydN8s/monthly-blog-round-up-may-2015.html</link>
         <description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;&lt;div dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt;  &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt;&lt;div dir=&quot;ltr&quot;&gt;&lt;ol&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why  No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from  2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log  search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break  the logic of that post. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a  lot&lt;/em&gt; of work, whether you paid for the software, or not. &lt;i&gt;[179  pageviews]&lt;/i&gt;  &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple  Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the  checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On  Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated  version&lt;/a&gt;) &lt;i&gt;[136 pageviews]&lt;/i&gt;  &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10  Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running  my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this  document&lt;/a&gt;) &lt;i&gt;[94 pageviews]&lt;/i&gt;  &lt;/li&gt;&lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log  Review series&lt;/a&gt; is always popular! The series of 18 posts cover a  comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for  building log review processes and procedures , whether regulatory or not. It is  also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our  Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its  4th edition!&lt;/a&gt;) &lt;i&gt;[80+ pageviews to the main tag]&lt;/i&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New  SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a  whitepaper on select SIEM use cases described in depth with rules and reports  [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also  see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in  depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt;  for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases.  &lt;i&gt;[55 pageviews of total 4310 pageviews to all blog pages]&lt;/i&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot;&gt;In addition, I’d like to draw  your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;:  &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Current research on cloud security monitoring:&lt;/strong&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot;&gt;&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;&lt;div&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/26/cloud-security-monitoring-revisited-aka-it-is-not-2012-anymore-4/&quot;&gt;Cloud  Security Monitoring … Revisited (aka It Is Not 2012  Anymore!)&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot;&gt;&lt;strong&gt;Past research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security  analytics&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/05/08/my-demystifying-security-analytics-sources-methods-and-use-cases-paper-publishes/&quot;&gt;My  “Demystifying Security Analytics: Sources, Methods and Use Cases” Paper  Publishes&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/10/now-that-we-have-all-that-data-what-do-we-do-revisited/&quot;&gt;Now  That We Have All That Data What Do We Do, Revisited&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/06/who-validates-alerts-validated-by-your-alert-validator-software/&quot;&gt;Who  Validates Alerts Validated by Your Alert Validator Software?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/03/killed-by-ai-much-a-rise-of-non-deterministic-security/&quot;&gt;Killed  by AI Much? A Rise of Non-deterministic Security!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/siem-dlp-add-on-brain/&quot;&gt;SIEM / DLP  Add-on Brain&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/19/those-pesky-users-how-to-catch-bad-usage-of-good-accounts/&quot;&gt;Those  Pesky Users: How To Catch Bad Usage of Good Accounts&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/09/security-analytics-lessons-learned-and-ignored/&quot;&gt;Security  Analytics Lessons Learned — and Ignored!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/03/security-analytics-projects-vs-boxes-built-vs-buy/&quot;&gt;Security  Analytics: Projects vs Boxes (Build vs Buy)?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do  You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security  Analytics – Finally Emerging For Real?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why  No Security Analytics Market?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun  posts&lt;/strong&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/04/30/rsa-2015-rise-of-chaos/&quot;&gt;RSA  2015: Rise of Chaos!!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/04/09/the-future-is-here-and-it-is-network-endpoint/&quot;&gt;The  Future Is Here … And It Is … Network? Endpoint?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat  The Casual Attacker First!!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On  “Defender’s Advantage”&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye,  Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/all-my-research-published-in-2014/&quot;&gt;All  My Research Published in 2014&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br /&gt;Also  see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular  Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;,  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;:  most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior  blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined  Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the  time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;br /&gt;   &lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/05/monthly-blog-round-up-april-2015.html&quot;&gt;Monthly  Blog Round-Up – April 2015&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=KQULOKydN8s:rUCPXwMvLfI:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=KQULOKydN8s:rUCPXwMvLfI:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=KQULOKydN8s:rUCPXwMvLfI:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/KQULOKydN8s&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-619265862372860968</guid>
         <pubDate>Mon, 01 Jun 2015 15:03:17 +0000</pubDate>
      </item>
      <item>
         <title>C. Warren Axelrod:   Smart Cars, Smarter Roads</title>
         <link>http://feedproxy.google.com/~r/bloginfosec/krfr/~3/8iKfsW_UiqM/</link>
         <description>I was somewhat puzzled as to why, here in the U.S., there has been relatively little discussion of infrastructure enhancements needed in order to implement safe and secure autonomous vehicles. Then I read the article “Europe’s Smart Highway Will Shepherd Cars from Rotterdam to Vienna” by Philip E. Ross, posted on IEEE Spectrum on December [&amp;#8230;]&lt;br /&gt;
 
 
&lt;br /&gt;</description>
         <guid isPermaLink="false">http://www.bloginfosec.com/?p=2591</guid>
         <pubDate>Tue, 26 May 2015 10:00:28 +0000</pubDate>
         <content:encoded><![CDATA[<p>I was somewhat puzzled as to why, here in the U.S., there has been relatively little discussion of infrastructure enhancements needed in order to implement safe and secure autonomous vehicles. Then I read the article “Europe’s Smart Highway Will Shepherd Cars from Rotterdam to Vienna” by Philip E. Ross, posted on <strong><em>IEEE Spectrum</em></strong> on December 30, 2014 at <a rel="nofollow" target="_blank" href="http://spectrum.ieee.org/transportation/advanced-cars/europes-smart-highway-will-shepherd-cars-from-rotterdam-to-vienna">http://spectrum.ieee.org/transportation/advanced-cars/europes-smart-highway-will-shepherd-cars-from-rotterdam-to-vienna</a>  and it all became much clearer. According to the article, the U.S. Highway Trust Fund is practically broke and therefore doesn’t have the funds to put into place various sensors and communications systems that would allow vehicles to communicate with the highway infrastructure and therefore be much more trustworthy with respect to their security and safety.</p>
<p>By the way, Ross posted an earlier piece on August 20, 2014 on <strong><em>IEEE Spectrum</em></strong> with the title “Why Can’t Government Run Vehicle-to-Vehicle Communications?” at <a rel="nofollow" target="_blank" href="http://spectrum.ieee.org/cars-that-think/transportation/infrastructure/why-cant-the-government-run-vehicletovehicle-communications">http://spectrum.ieee.org/cars-that-think/transportation/infrastructure/why-cant-the-government-run-vehicletovehicle-communications</a> citing the same lack of funds as the reason.</p>
<p>I have felt for some time that safe and secure vehicle control systems and vehicle-to-vehicle communications will need a carefully constructed infrastructure that informs vehicles of road conditions, temporary disruptions (road works, accidents, dangerous weather), and communications between the infrastructure and vehicles. Yet most of the conversations about self-driving vehicles in the U.S. tend to center around on-board systems and communications with the Web.</p>
<p>For the first time I noticed an article about self-driving cars in which it was actually admitted that there have indeed been a number of accidents and crashes of these vehicles which try to replace the human senses but which only perceive the environment and other vehicles via video cameras, radar and other sensors. That is to say, there is no two-way communication.  In his May 16, 2015 <strong><em>Scientific American</em></strong> article “Google’s Self-Driving Cars to Hit Roads, with Steering Wheels,” which can be found at <a rel="nofollow" target="_blank" href="http://www.scientificamerican.com/article/google-s-self-driving-cars-to-hit-roads-with-steering-wheels/">http://www.scientificamerican.com/article/google-s-self-driving-cars-to-hit-roads-with-steering-wheels/</a>, Paul Lienert writes that “&#8230; Google disclosed that its self-driving &#8230; vehicles had been involved in 11 accidents on public roads &#8230; Not once was the self-driving car the cause of the accident [said project director Chris Urmson] &#8230; the cars had been hit from behind seven times, mainly at traffic lights, with a majority of the accidents being on city streets rather than on freeways.”</p>
<p>I must say that it is somewhat disingenuous to say that the self-driving cars didn’t cause any of the accidents. Granted it is not seen to be your fault if you are hit from behind, but, as many of us have experienced, if the car in front of you slams on its brakes unexpectedly, you, as the following vehicle, may not have much opportunity to stop in time. Be that as it may, it is apparent that it is not sufficient for self-driving cars to follow the rules of the road by themselves, they need to be more aware of what impact their actions may have on others. This supports the need for intelligent infrastructure and for ALL cars to be able to communicate with ALL the others and for a comprehensive, intelligent infrastructure.</p>
<p>In a column, “Car Talk: Vehicle-to vehicle communication is coming, Are we ready for it?” in the March 2015 issue of <strong><em>Communications of the ACM</em></strong>, Tom Geller differentiates among on-board sensors, such as rear-view cameras, V2I (vehicle-to-infrastructure), and V2V (vehicle-to-vehicle) technologies, with the latter two referred to generically as V2X technologies. The article is an excellent overview of the various technologies needed for autonomous vehicles to operate safely, although it doesn’t point out the greatly expanded cyber attack surface that these systems open up. There is clearly a need for threat modeling for these systems both independently and when connected to one another.</p>
<p>Aaron M. Kessler’s article “Hands-Free Cars Take Wheel, And Law Isn’t Stopping Them,” on the front page of <strong><em>The New York Times</em></strong> of May 3, 2015, describes how lawmakers and regulators are trying to catch up with the technology with minimal success.</p>
<p>Again we see the rush to bring these autonomous vehicle technologies to market without much-needed laws and regulations. Nor is attention being paid to securing these systems against cyber attacks. This is yet another example of looking to bolt on security and safety, after systems have already been deployed, at much greater expense and with much greater risk of successful cyber attacks, malfunctions and failures in the interim.</p>
<img src="http://feeds.feedburner.com/~r/bloginfosec/krfr/~4/8iKfsW_UiqM" height="1" width="1" alt=""/>]]></content:encoded>
      </item>
      <item>
         <title>Richard Bejtlich:   An Irrelevant Thesis</title>
         <link>http://taosecurity.blogspot.com/2015/05/an-irrelevant-thesis.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-XFl8hZ4rEWs/VWClMNXHyHI/AAAAAAAAKmU/CLeuSNTUzds/s1600/wrong.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; src=&quot;http://3.bp.blogspot.com/-XFl8hZ4rEWs/VWClMNXHyHI/AAAAAAAAKmU/CLeuSNTUzds/s320/wrong.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;This week The Diplomat published an article by Dr Greg Austin titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://thediplomat.com/2015/05/what-the-us-gets-wrong-about-chinese-cyberespionage/&quot;&gt;What the US Gets Wrong About Chinese Cyberespionage&lt;/a&gt;. The subtitle teases the thesis: &quot;Is it government policy in China to pass on commercial secrets obtained via cyberespionage to civil sector firms?&quot; As you might expect (because it prompted me to write this post), the author's answer is &quot;no.&quot;&lt;br /&gt;&lt;br /&gt;The following contains the argument:&lt;br /&gt;&lt;br /&gt;&quot;Chinese actors may be particularly adept in certain stages of economic espionage, but it is &lt;b&gt;almost certainly not Chinese government policy to allow the transfer of trade secrets collected by highly classified intelligence sources to its civil sector firms for non-military technologies on a wide-spread basis&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;A U.S. influencing strategy toward China premised on the claim that this is China’s policy would appear to be ill-advised based on the evidence introduced so far by the United States in the public domain.&quot; (emphasis added)&lt;br /&gt;&lt;br /&gt;I find it interesting that the author concedes theft by Chinese government actors, which the Chinese government refuses to acknowledge. However, the author seeks to excuse this activity out of concern for the effect it has on US-China ties.&lt;br /&gt;&lt;br /&gt;One aspect of the relationship between China and the US worries the author most:&lt;br /&gt;&lt;br /&gt;&quot;There are many ways to characterize the &lt;b&gt;negative impact&lt;/b&gt; on potential bilateral cooperation on cyberspace issues &lt;b&gt;of the “lawfare” being practised by the United States to discipline China for its massive cyber intrusions into the commercial secrets of U.S. firms&lt;/b&gt;. One downside is in my view more important than others. This is the &lt;b&gt;belief &lt;/b&gt;being fostered by U.S. officials among elites in the United States and in other countries that &lt;b&gt;China as&lt;/b&gt; a nation is &lt;b&gt;a “cheater” country&lt;/b&gt;...&quot;&lt;br /&gt;&lt;br /&gt;Then, in a manner similar to the way Chinese spokespeople respond to any Western accusations of wrongdoing, the author turns the often-heard &quot;Chinese espionage as the largest transfer of wealth in history&quot; argument against the US:&lt;br /&gt;&lt;br /&gt;&quot;In the absence of any Administration taxonomy of the economic impacts of cyber espionage, alleged by some to represent the largest illicit transfer of wealth in human history, one way of evaluating it is to understand that &lt;b&gt;for more than three decades it has been U.S. policy, like that of its principal allies, to undertake the largest lawful transfer of wealth in human history&lt;/b&gt; through trade with, investment in and technology transfer to China.&quot;&lt;br /&gt;&lt;br /&gt;(I'm not sure I understand the cited benefits the US has accrued due to this &quot;largest lawful transfer of wealth in human history,&quot; given the hollowing out of the American manufacturing sector and the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.census.gov/foreign-trade/balance/c5700.html&quot;&gt;trade imbalance with China&lt;/a&gt;, which totaled over $82 billion in 1Q15 alone. It's possible I am not appreciating what the author means though.)&lt;br /&gt;&lt;br /&gt;Let's accept, for argument's sake, that it is not &quot;official&quot; Chinese government policy for its intelligence and military forces to steal commercial data from private and non-governmental Western organizations. How does accepting that proposition improve the situation? Would China excuse the US government if a &quot;rogue&quot; element of the American intelligence community or military pursued a multi-decade campaign against Chinese targets?&lt;br /&gt;&lt;br /&gt;Even if the US government accepted this &quot;Chinese data theft by rogue government actor&quot; theory, it would not change the American position: stop this activity, by whatever means necessary. Given the power amassed by President Xi during his anti-corruption crackdown, I would expect he would be able to achieve at least some success in limiting his so-called &quot;rogue actors&quot; during the 2+ years since Mandiant released the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.mandiant.com/apt1&quot;&gt;APT1 report&lt;/a&gt;. As Nicole Perlroth &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://bits.blogs.nytimes.com/2015/05/10/an-obama-plan-to-stop-foreign-hackers-has-had-mixed-results/?_r=0&quot;&gt;reported&lt;/a&gt; this month, Chinese hacking continues unabated. In fact, China has introduced new capabilities, such as the so-called &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://citizenlab.org/2015/04/chinas-great-cannon/&quot;&gt;Great Cannon&lt;/a&gt;, used to degrade&amp;nbsp;GitHub and others.&lt;br /&gt;&lt;br /&gt;Similar to the argument I made in my post&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2014/12/what-does-responsibility-mean-for.html&quot;&gt;What Does &quot;Responsibility&quot; Mean for Attribution?&lt;/a&gt;, &quot;responsibility&quot; is the key issue. Based on my experience and research, I submit that Chinese computer network exploitation of private and non-governmental Western organizations is &quot;state-integrated&quot; and &quot;state-executed.&quot; Greg Austin believes the activity is, at worst, &quot;state-rogue-conducted.&quot; Stepping down one rung on the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2012/11/spectrum-of-state-responsibility.html&quot;&gt;state spectrum of responsibility&lt;/a&gt; ladder is far from enough to change US government policy towards China.&lt;br /&gt;&lt;br /&gt;Note: In addition to the article in The Diplomat, the author wrote a longer paper titled &amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://thediplomat.com/wp-content/uploads/2015/05/thediplomat_2015-05-21_22-14-05.pdf&quot;&gt;China’s Cyberespionage: The National Security Distinction and U.S. Diplomacy&lt;/a&gt;&amp;nbsp;(pdf).&lt;br /&gt;&lt;br /&gt;I also plan to read Dr Austin's new book, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/dp/B00OCJS6PQ/&quot;&gt;Cyber Policy in China&lt;/a&gt;, which looks great! Who knows, we might even be able to collaborate, given his work with the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.kcl.ac.uk/sspp/departments/warstudies/people/visiting/austin.aspx&quot;&gt;War Studies department at KCL&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-2714072648444668902</guid>
         <pubDate>Sat, 23 May 2015 12:40:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-XFl8hZ4rEWs/VWClMNXHyHI/AAAAAAAAKmU/CLeuSNTUzds/s72-c/wrong.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   What Year Is This?</title>
         <link>http://taosecurity.blogspot.com/2015/05/what-year-is-this.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-mosS1H2HwS4/VU-oJSHY0bI/AAAAAAAAKeU/zwU5725eBnU/s1600/FullSizeRender.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;203&quot; src=&quot;http://4.bp.blogspot.com/-mosS1H2HwS4/VU-oJSHY0bI/AAAAAAAAKeU/zwU5725eBnU/s320/FullSizeRender.jpg&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I recently read a manuscript discussing computer crime and security. I've typed out several excerpts and published them below. Please read them and try to determine how recently this document was written.&lt;br /&gt;&lt;br /&gt;The first excerpt discusses the relationship between the computer and the criminal.&lt;br /&gt;&lt;br /&gt;&quot;The impersonality of the computer and the fact that it symbolizes for so many a system of uncaring power tend not only to incite efforts to strike back at the machine but also to provide certain people with a set of convenient rationalizations for engaging in fraud or embezzlement. The computer lends an ideological cloak for the carrying out of criminal acts. &lt;br /&gt;&lt;br /&gt;Computer crime... also holds several other attractions for the potential lawbreaker. It provides intellectual challenge -- a form of breaking and entering in which the burglar’s tools are essentially an understanding of the logical structure of and logical flaws inherent in particular programming and processing systems. It opens the prospect of obtaining money by means that, while clearly illegal, do not usually involve taking it directly from the till or the cashier’s drawer...&lt;br /&gt;&lt;br /&gt;Other tempting features of computer crime, as distinct from other forms of criminal activity, are that most such crimes are difficult to detect and that when the guilty parties are detected not much seems to happen to them. For various reasons, they are seldom intensively prosecuted, if they are prosecuted at all. On top of these advantages, the haul from computer crime tends to be very handsome compared with that from other crimes.&quot;&lt;br /&gt;&lt;br /&gt;The second excerpt describes the attitudes of corporate computer crime victims.&lt;br /&gt;&lt;br /&gt;&quot;The difficulties of catching up with the people who have committed computer crimes is compounded by the reluctance of corporations to talk about the fact that they have been defrauded and by the difficulties and embarrassments of prosecution and trial. In instance after instance, corporations whose assets have been plundered -- whose computer operations have been manipulated to churn out fictitious accounting data or to print large checks to the holders of dummy accounts -- have preferred to suffer in silence rather than to have the horrid facts about the frailty of their miracle processing systems come to public attention.&lt;br /&gt;&lt;br /&gt;Top management people in large corporations fear that publicity about internal fraud could well affect their companies’ trading positions on the stock market, hold the corporations up to public ridicule, and cause all sorts of turmoil within their staffs. In many cases, it seems, management will go to great lengths to keep the fact of an internal computer crime from its own stockholders...&lt;br /&gt;&lt;br /&gt;The reluctance of corporations to subject themselves to unfavorable publicity over computer crimes is so great that some corporations actually seem willing to take the risk of getting into trouble with the law themselves by concealing crimes committed against them. Among independent computer security consultants, it is widely suspected that certain banks, which seem exceptionally reluctant to admit that such a thing as computer fraud even exists in the banking fraternity, do not always report such crimes to the Comptroller of the Currency, in Washington, when they occur, as all banks are required to do by federal law. Bank officers do not discuss the details of computer crime with the press... [A] principal reason for this kind of behavior is the fear on the part of the banks that such a record will bring about an increase in their insurance rates.&quot;&lt;br /&gt;&lt;br /&gt;The third excerpt talks about the challenges of prosecuting computer crime.&lt;br /&gt;&lt;br /&gt;&quot;In addition to the problems of detecting and bringing computer crimes to light, there are the difficulties of effectively prosecuting computer criminals. In the first place, the police, if they are to collect evidence, have to be able to understand precisely how a crime may have been committed, and that usually calls for the kind of technical knowledge that is simply not available to most police departments...&lt;br /&gt;&lt;br /&gt;Another difficulty is that not only police and prosecutors but judges and juries must be able to find their way through the mass of technical detail before they can render verdicts and hand down decisions in cases of computer crime, and this alone is a demanding task. In the face of all the complexities involved and all the time necessary to prepare a case that will stand up in court, many prosecutors try to make the best accommodation they can with the defendant’s lawyers by plea bargaining, or else they simply allow the case to fade away unprosecuted. If they do bring a case to trial, they have the problem of presenting evidence that is acceptable to the court.&lt;br /&gt;&lt;br /&gt;The fourth excerpt mentions &quot;sophistication&quot; -- a hot topic!&lt;br /&gt;&lt;br /&gt;To somebody looking at the problem of computer crime as a whole, one conclusion that seems reasonable is that although some of the criminal manipulators of computer systems have shown certain ingenuity, they have not employed highly sophisticated approaches to break into and misuse computer systems without detection. In a way, this fact in itself is something of a comment on the security of most existing computer systems: the brains are presumably available to commit those &amp;nbsp;sophisticated computer crimes, but the reason that advanced techniques haven’t been used much may well be that the haven’t been necessary.&quot;&lt;br /&gt;&lt;br /&gt;The fifth excerpt briefly lists possible countermeasures.&lt;br /&gt;&lt;br /&gt;&quot;The accelerating incidence of computer-related crimes -- particularly in the light of the continuing rapid growth of the computer industry and the present ubiquity of electronic data-processing systems -- raises the question of what countermeasures can be taken within industry and government to prevent such crimes, or, at least, to detect them with precision when they occur...&lt;br /&gt;&lt;br /&gt;In addition to tight physical security for facilities, these [countermeasures] included such internal checks within a system to insure data security as adequate identification procedures for people communicating with the computer... elaborate internal audit trails built into a system, in which every significant communication between a user and a computer would be recorded; and, where confidentiality was particularly important, cryptography...&quot;&lt;br /&gt;&lt;br /&gt;Now based on what you have read, I'd like you to guess in which decade these excerpts were written? By answering the survey you will learn the publication date.&lt;br /&gt;&lt;br /&gt; Loading... &lt;br /&gt;&lt;br /&gt;I'll leave you with one other quote from the manuscript:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The fact is, [a security expert] said, that “the data-security job will never be done -- after all, there will never be a bank that absolutely can’t be robbed.” The main thing, he said, is to make the cost of breaching security so high that the effort involved will be discouragingly great.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-2362866853224134266</guid>
         <pubDate>Sun, 10 May 2015 15:07:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-mosS1H2HwS4/VU-oJSHY0bI/AAAAAAAAKeU/zwU5725eBnU/s72-c/FullSizeRender.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – April 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/fImD-5KrV7I/monthly-blog-round-up-april-2015.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. &lt;i&gt;[282 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;i&gt;[116 pageviews]&lt;/i&gt;  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;i&gt;[114 pageviews]&lt;/i&gt;  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;) &lt;i&gt;[100+ pageviews to the main tag]&lt;/i&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases. &lt;i&gt;[92 pageviews of total 5079 pageviews to all blog pages]&lt;/i&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br&gt;&lt;br&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security analytics&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/10/now-that-we-have-all-that-data-what-do-we-do-revisited/&quot;&gt;Now That We Have All That Data What Do We Do, Revisited&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/06/who-validates-alerts-validated-by-your-alert-validator-software/&quot;&gt;Who Validates Alerts Validated by Your Alert Validator Software?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/03/killed-by-ai-much-a-rise-of-non-deterministic-security/&quot;&gt;Killed by AI Much? A Rise of Non-deterministic Security!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/siem-dlp-add-on-brain/&quot;&gt;SIEM / DLP Add-on Brain&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/19/those-pesky-users-how-to-catch-bad-usage-of-good-accounts/&quot;&gt;Those Pesky Users: How To Catch Bad Usage of Good Accounts&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/09/security-analytics-lessons-learned-and-ignored/&quot;&gt;Security Analytics Lessons Learned — and Ignored!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/03/security-analytics-projects-vs-boxes-built-vs-buy/&quot;&gt;Security Analytics: Projects vs Boxes (Build vs Buy)?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security Analytics – Finally Emerging For Real?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;br&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/04/30/rsa-2015-rise-of-chaos/&quot;&gt;RSA 2015: Rise of Chaos!!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/04/09/the-future-is-here-and-it-is-network-endpoint/&quot;&gt;The Future Is Here … And It Is … Network? Endpoint?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/all-my-research-published-in-2014/&quot;&gt;All My Research Published in 2014&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;br&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/04/monthly-blog-round-up-march-2015.html&quot;&gt;Monthly Blog Round-Up – March 2015&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=fImD-5KrV7I:zbOkGjquVN8:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=fImD-5KrV7I:zbOkGjquVN8:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=fImD-5KrV7I:zbOkGjquVN8:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/fImD-5KrV7I&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5934893469420673797</guid>
         <pubDate>Fri, 01 May 2015 18:11:00 +0000</pubDate>
      </item>
      <item>
         <title>Richard Bejtlich:   The Need for Test Data</title>
         <link>http://taosecurity.blogspot.com/2015/04/the-need-for-test-data.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-jwsJ3LF4s0I/VUKabvapAqI/AAAAAAAAKdE/Ipo64QZhmKM/s1600/logs.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-jwsJ3LF4s0I/VUKabvapAqI/AAAAAAAAKdE/Ipo64QZhmKM/s1600/logs.jpg&quot; height=&quot;144&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Last week at the RSA Conference, I spoke to several vendors about their challenges offering products and services in the security arena. One mentioned a problem I had not heard before, but which made sense to me. The same topic will likely resonate with security researchers, academics, and developers.&lt;br /&gt;&lt;br /&gt;The vendor said that his company needed access to large amounts of realistic computing evidence to test and refine their product and service. For example, if a vendor develops software that inspects network traffic, it's important to have realistic network traffic on hand. The same is true of software that works on the endpoint, or on application logs.&lt;br /&gt;&lt;br /&gt;Nothing in the lab is quite the same as what one finds in the wild. If vendors create products that work well in the lab but fail in production, no one wins. The same is true for those who conduct research, either as coders or academics.&lt;br /&gt;&lt;br /&gt;When I asked vendors about their challenges, I was looking for issues that might meet the criteria of Allan Friedman's new project, as reported in the Federal Register:&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.federalregister.gov/articles/2015/03/19/2015-06344/stakeholder-engagement-on-cybersecurity-in-the-digital-ecosystem&quot;&gt;Stakeholder Engagement on Cybersecurity in the Digital Ecosystem&lt;/a&gt;. Allan's work at the Department of Commerce seeks &quot;substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations and consumers.&quot;&lt;br /&gt;&lt;br /&gt;I don't know if &quot;realistic computing evidence&quot; counts, but perhaps others have ideas that are helpful?&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-1637704786881437054</guid>
         <pubDate>Thu, 30 Apr 2015 17:22:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://2.bp.blogspot.com/-jwsJ3LF4s0I/VUKabvapAqI/AAAAAAAAKdE/Ipo64QZhmKM/s72-c/logs.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Will &quot;Guaranteed Security&quot; Save the Digital World?</title>
         <link>http://taosecurity.blogspot.com/2015/04/will-guaranteed-security-save-digital.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-P0ZjoF4p7eU/VUAj59melyI/AAAAAAAAJ9Q/uRIU1jkwDsc/s1600/jg01.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-P0ZjoF4p7eU/VUAj59melyI/AAAAAAAAJ9Q/uRIU1jkwDsc/s1600/jg01.jpg&quot; height=&quot;320&quot; width=&quot;266&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Thanks to a comment by Jeremiah Grossman on LinkedIn, I learned of his RSA talk&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.slideshare.net/jeremiahgrossman/no-more-snake-oil-why-infosec-needs-security-guarantees&quot;&gt;No More Snake Oil: Why InfoSec Needs Security Guarantees&lt;/a&gt;. I thought his slide deck looked interesting and I wish I had seen the talk.&lt;br /&gt;&lt;br /&gt;One of his arguments is that security products and services lack guarantees, &quot;unlike every day 'real world' products,&quot; as shown on slide 3 at left.&lt;br /&gt;&lt;br /&gt;The difference between the products at left and those protected by security products and services, however, is that security products and services are trying to counter intelligent, adaptive adversaries.&lt;br /&gt;&lt;br /&gt;Jeremiah does include a slide showing multiple &quot;online security guarantees&quot; for financial services. Those assets do indeed face challenges from the sorts of adversaries I have in mind. I need to hear more about what Jeremiah said at this point, and also I need to learn more about this individual guarantees.&lt;br /&gt;&lt;br /&gt;It may be useful to look at what physical security companies offer by way of guarantees. I did not see this angle in Jeremiah's slides, although he may have talked about it.&lt;br /&gt;&lt;br /&gt;Taking a tentative step in this direction, I visited the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.adt.com/our-difference&quot;&gt;ADT&lt;/a&gt; web site. You've seen their ads for protecting homes, and you might even be a customer. This is the sort of company that faces at least some threats who are intelligent and/or adaptive. What guarantees does ADT offer?&lt;br /&gt;&lt;br /&gt;The screen capture below shows the answer. I am particularly interested in the &quot;Theft Protection Guarantee.&quot;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-kepG0Eo6EGU/VUAl5eirsTI/AAAAAAAAJ9c/VK1pchsYDIQ/s1600/adt01.jpg&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-kepG0Eo6EGU/VUAl5eirsTI/AAAAAAAAJ9c/VK1pchsYDIQ/s1600/adt01.jpg&quot; height=&quot;456&quot; width=&quot;640&quot;/&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:left;&quot;&gt;A theft protection guarantee is like a &quot;hack prevention guarantee.&quot; As you can see, if your home is burglarized while under ADT monitoring, you get up to $500 paid toward your insurance deductible.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:left;&quot;&gt;The fine print is even more interesting:&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&quot;The Customer presenting ADT with this ORIGINAL CERTIFICATE will be eligible to receive a reimbursement of up to five hundred dollars ($500) of Customer’s homeowner’s&amp;nbsp;&lt;/i&gt;&lt;i&gt;insurance deductible (if any) if, and only if, &lt;b&gt;ALL of the following requirements are met to ADT’s reasonable satisfaction&lt;/b&gt;:&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(i) the property loss was the result of a burglary that took place while the security system installed at Customer’s protected premises was &lt;b&gt;in good working order and was “on,” &lt;/b&gt;and while &lt;b&gt;all of Customer’s doors and windows were locked;&lt;/b&gt; and&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(ii) &lt;b&gt;the intruder entered the residence through a door, window or other area equipped with an ADT detection device&lt;/b&gt;, and such detection device was not “&lt;b&gt;bypassed&lt;/b&gt;”; and&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(iii) Customer is not in any way &lt;b&gt;in default&lt;/b&gt; under the ADT Residential Systems Customer’s Order; and&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(iv) Customer files a written claim with their homeowner’s insurance company, and such claim is not rejected or otherwise contested by the insurer; and&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(v) Customer reports the burglary loss to the appropriate police department and obtains&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;a written police report; and&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(vi) Customer provides ADT with copies of the insurance claim report, the police report within six&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;ty (60) days of the property loss and proof of settlement by insurance carrier; and&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;(vii) Customer certifies in writing to ADT (by signing this ORIGINAL CERTIFICATE and presenting it to ADT within sixty [60] days of the property loss) that all of the foregoing requirements have been satisfied.&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;&quot;&gt;&lt;i&gt;Customer understands that presentation of this ORIGINAL CERTIFICATE signed by Customer is required and understands that &lt;b&gt;ADT reserves the right to reject any application for reimbursement that does not comply with ALL of the requirements&lt;/b&gt;.&quot;&lt;/i&gt; (emphasis added)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Can you imagine the equivalent conditions for a digital security service or product? Could you imagine a customer being able to prove it met the requirements?&lt;br /&gt;&lt;br /&gt;It would be interesting to see how many times ADT has paid out this guarantee money.&lt;br /&gt;&lt;br /&gt;Wait, you might say, Jeremiah showed a car in the slide at the top of this post. What do car security guarantees look like? I'm glad you asked. Here's one of the top results I found online, for &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.viper.com/Support/GPP.aspx&quot;&gt;Viper&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-5x_SiHT-gJg/VUAodfGzJWI/AAAAAAAAJ9o/hGlNxykQ8HM/s1600/viper01.jpg&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-5x_SiHT-gJg/VUAodfGzJWI/AAAAAAAAJ9o/hGlNxykQ8HM/s1600/viper01.jpg&quot; height=&quot;255&quot; width=&quot;400&quot;/&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Here is the fine print:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&quot;Qualifications:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; The qualifying system was sold, installed, and serviced by an authorized dealer for DIRECTED, remains in the car in which the system was originally installed, and owned by the original purchaser of the qualifying system. &lt;b&gt;Window decals&lt;/b&gt; must have been in place on the vehicle at the time of installation.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;The theft occurred less than one year after the date of purchase of the qualifying Viper system.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; This GPP claim is made within sixty (60) days of settlement of your claim with your insurance carrier. (90 days in New York state)&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;The warranty registration card was completely filled out and mailed to DIRECTED within 10 days of purchase.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;The vehicle was stolen as a result of alarm system failure and the automobile was not left in an inactive/disarmed mode for whatever reason, even if left at a service station.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; A police report must be filed and a copy submitted with your GPP claim.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; Vehicle must be insured against theft at the time vehicle was stolen.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; The insurance company must accept and pay the claim.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;A DIRECTED starter kill device must have been installed&lt;/b&gt; on the vehicle and the sales receipt must show starter kill installation.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Your claim MUST meet all of the criteria as stated above to be eligible to file a claim for reimbursement of your comprehensive deductible...&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;A product's warranty is automatically void if its &lt;b&gt;date code or serial number is defaced, missing, or altered&lt;/b&gt;. &lt;b&gt;GPP does not cover vandalism, theft of vehicle parts, contents, damage to vehicle and/or towing charges. Furthermore, vehicles that are consigned or displayed for sale are not covered by the GPP program&lt;/b&gt;. GPP is not available to employees, agents, friends or relatives of Directed or of its dealers.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;GPP does not extend to or cover motorcycles or &lt;b&gt;vehicles without lockable doors, ignition systems and/or engine compartments.&lt;/b&gt;&quot; (emphasis added)&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Again, I ask, can you imagine the equivalent conditions for a digital security service or product? Could you imagine a customer being able to prove it met the requirements?&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Given these examples of security guarantees in the physical work, I don't think we will see much progress in the digital world, perhaps beyond paying insurance deductibles.&lt;br /&gt;&lt;br /&gt;I believe the heavy work on the economic side will be done by the insurance companies, as is indicated by these physical security examples.&lt;br /&gt;&lt;br /&gt;We are likely to see more insurance on the security vendor side, as we are already seeing (as noted in Jeremiah's talk) much more insurance in the security consumer (enterprise) arena.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Quick addendum: &lt;/i&gt;It just occurred to me that the security services mentioned earlier are primarily means to the following:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Decrease insurance premiums.&lt;/li&gt;&lt;li&gt;Deter attackers.&lt;/li&gt;&lt;li&gt;If deterrence fails, increase the changes of more rapid police response.&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;These ideas have some relevance in the digital security world, although I think &quot;stickers&quot; saying &quot;protected by product X and service Y&quot; may have the opposite effect, as they may give intruders ideas on how to bypass the defenses. Then again, that might already happen with the house and car alarm examples.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-871446298132011594</guid>
         <pubDate>Tue, 28 Apr 2015 20:47:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-P0ZjoF4p7eU/VUAj59melyI/AAAAAAAAJ9Q/uRIU1jkwDsc/s72-c/jg01.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Example of Chinese Military Converging on US Military</title>
         <link>http://taosecurity.blogspot.com/2015/04/example-of-chinese-military-converging.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-7ycilmaw3nw/VSw0m6RbvEI/AAAAAAAAJ54/lgjxX-rv7jM/s1600/chinascope.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-7ycilmaw3nw/VSw0m6RbvEI/AAAAAAAAJ54/lgjxX-rv7jM/s1600/chinascope.jpg&quot; height=&quot;234&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;We often hear of vulnerabilities in the US military introduced by net-centric warfare and a reliance on communications network. As the Chinese military modernizes, it will introduce similar vulnerabilities.&lt;br /&gt;&lt;br /&gt;I found another example of this phenomenon courtesy of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chinascope.org/main/content/view/7067/105/&quot;&gt;Chinascope&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;PLA Used its Online Purchasing Website for its First Online Purchase&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Written by LKY and AEF &amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Xinhua reported that on, April 7, the PLA announced that five manufacturers won the bidding, totaling 90 million yuan (US$14.48 million), to supply general and maintenance equipment to the PLA. The article said that these were the first purchase orders that the PLA received since it launched its &lt;b&gt;military equipment purchasing website&lt;/b&gt; in January. The site is at http://www.weain.mil.cn/.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;The PLA claimed that it saved close to 12 million yuan (US$1.93 million) compared to the list price. The purchase order consisted of items such as containers for maintenance equipment and tools, gas masks, carrier cases, and army field lighting. The article said that the PLA equipment purchasing website was launched on January 4. On February 25, the PLA General and Maintenance department made a public announcement on the website calling for bids. On March 19, the public bidding was held at Ordnance Engineering College in Shijiazhuang City of Hebei Province.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Over 20 manufacturers submitted bids and 5 of them, including some privately owned companies, won the bidding.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Source: Xinhua, April 12, 2015&lt;/i&gt;&lt;br /&gt;&lt;i&gt;http://news.xinhuanet.com/info/2015-04/12/c_134143641.htm&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;(emphasis added)&lt;br /&gt;&lt;br /&gt;You can imagine the sorts of opportunities this story presents to adversaries, including impersonating the Chinese Web site, phishing either party (supplier or purchaser), and so on.&lt;br /&gt;&lt;br /&gt;I expect other militaries to introduce similar vulnerabilities as they modernize, presenting more opportunities for their adversaries.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-3098018037901222496</guid>
         <pubDate>Mon, 13 Apr 2015 17:33:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-7ycilmaw3nw/VSw0m6RbvEI/AAAAAAAAJ54/lgjxX-rv7jM/s72-c/chinascope.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Network Security Monitoring Remains Relevant</title>
         <link>http://taosecurity.blogspot.com/2015/04/network-security-monitoring-remains.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-xuKrM72V2Hg/VSwUINDY_eI/AAAAAAAAJ5o/IZ4NguHSRIU/s1600/redirect.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-xuKrM72V2Hg/VSwUINDY_eI/AAAAAAAAJ5o/IZ4NguHSRIU/s1600/redirect.jpg&quot; height=&quot;302&quot; width=&quot;400&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Cylance blogged today about a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blog.cylance.com/redirect-to-smb&quot;&gt;Redirect to SMB&lt;/a&gt; problem found in many Windows applications. Unfortunately, it facilitates credential theft. Steve Ragan wrote a good &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.csoonline.com/article/2908476/vulnerabilities/18-year-old-smb-vulnerability-resurfaces-dozens-of-vendors-affected.html&quot;&gt;story&lt;/a&gt; discussing the problem. Note this issue does not rely on malware, at least not directly. It's a problem with Microsoft's Server Message Block protocol, with deep historical roots.&lt;br /&gt;&lt;br /&gt;(&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://hdm.io/writing/originals/Mitigating%20Service%20Account%20Credential%20Theft%20on%20Windows.pdf&quot;&gt;Mitigating Service Account Credential Theft on Windows&lt;/a&gt;&amp;nbsp;[pdf] is a good paper on mitigation techniques for a variety of SMB problems.)&lt;br /&gt;&lt;br /&gt;Rather than discussing the technical problem, I wanted to make a different point. After reading about this technique, you probably want to know when an intruder uses it against you, so you can see it and preferably stop it.&lt;br /&gt;&lt;br /&gt;However, you should be wondering if an intruder has &lt;b&gt;already used&lt;/b&gt; it against you.&lt;br /&gt;&lt;br /&gt;If you are practicing network security monitoring (described most recently in my newest &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://nostarch.com/nsm&quot;&gt;book&lt;/a&gt;), then you should already be collecting network-based evidence of this attack.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;You could check session data and infer that outbound traffic on using traditional SMB ports like 139 or 445 TCP are likely evidence of attack.&amp;nbsp;&lt;/li&gt;&lt;li&gt;You could review transaction data for artifacts of SMB traffic, looking for requests and replies.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Best of all, you could review full content data directly for SMB traffic, and see exactly what happened.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Whenever you see a discussion of a new attack vector, you will likely think &quot;how do I stop it, or at least see it?&quot;&lt;br /&gt;&lt;br /&gt;Don't forget to think about ways to determine if an attacker has already used it against you. Chances are that certain classes of intruders have been exercising it for days, weeks, months, or perhaps years before it surfaced in the media.&lt;br /&gt;&lt;br /&gt;PS: This post may remind you of my late 2013 post&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2013/11/linux-covert-channel-explains-why-nsm.html&quot;&gt;Linux Covert Channel Explains Why NSM Matters&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-8068606662911642784</guid>
         <pubDate>Mon, 13 Apr 2015 15:25:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-xuKrM72V2Hg/VSwUINDY_eI/AAAAAAAAJ5o/IZ4NguHSRIU/s72-c/redirect.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Please Support OpenNSM Group</title>
         <link>http://taosecurity.blogspot.com/2015/04/please-support-opennsm-group.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-CMqU1Mk6-A8/VSqMEZzRQ1I/AAAAAAAAJ5Q/wFg1g2zQJms/s1600/opennsm-gofundme.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-CMqU1Mk6-A8/VSqMEZzRQ1I/AAAAAAAAJ5Q/wFg1g2zQJms/s1600/opennsm-gofundme.jpg&quot; height=&quot;263&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Do you believe in finding and removing intruders on the network before they cause damage? Do you want to support like-minded people? If you answered &quot;yes,&quot; I'd like to tell you about a group that shares your views and needs your help.&lt;br /&gt;&lt;br /&gt;In August 2014, Jon Schipp started the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://open-nsm.net/&quot;&gt;Open (-Source) Network Security Monitoring Group (OpenNSM)&lt;/a&gt;. Jon is a security engineer at the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.ncsa.illinois.edu/&quot;&gt;National Center for Supercomputing Applications&lt;/a&gt; at the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://illinois.edu/&quot;&gt;University of Illinois at Urbana-Champaign&lt;/a&gt;. In his announcement on the project's &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://lists.illinois.edu/lists/subscribe/open-nsm&quot;&gt;mailing list&lt;/a&gt;, Jon wrote:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The idea for this group came from a suggestion in Richard Bejtlich's &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://nostarch.com/nsm&quot;&gt;most recent book&lt;/a&gt;, where he mentions it would be nice to see NSM groups spawn up all over much like other software user groups and for the same reasons.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Network security monitoring is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. It is an operational campaign supporting a strategy of identifying and removing intruders before they accomplish their mission, thereby implementing a policy of minimizing loss due to intrusions. At the tactical and tool level, NSM relies on instrumenting the network and applying hunting and matching to find intruders.&lt;br /&gt;&lt;br /&gt;Long-time blog readers know that I have &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.taosecurity.com/research.html&quot;&gt;developed and advocated&lt;/a&gt; NSM since the late 1990s, when I learned the practice at the Air Force Computer Emergency Response Team (AFCERT). &lt;br /&gt;&lt;br /&gt;I am really pleased to see this group holding weekly meetings, which are available live or as recordings at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.youtube.com/user/OpenNSM&quot;&gt;YouTube&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The group is seeking funding and sponsorship to build a NSM laboratory and conduct research projects. They want to give students and active members hands-on experience with NSM tools and tactics to conduct defensive operations. They outline their plans for funding in this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://docs.google.com/document/d/10NSL1wWMb-bNp7h6UEYNfzyMvJ0kbxxPTSQj9vAsPyM/edit&quot;&gt;Google document&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I decided to support this group first as an individual, so I just donated $100 to the cause. If you are a like-minded individual, or perhaps represent an organization or company, please consider &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gofundme.com/opennsm&quot;&gt;donating via GoFundMe&lt;/a&gt; to support this OpenNSM group and their project. You can also follow them &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/OpenNSM&quot;&gt;@opennsm&lt;/a&gt;&amp;nbsp;and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.facebook.com/groups/opennsmnow/&quot;&gt;Facebook&lt;/a&gt;, and check out their notes at code at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://github.com/open-nsm&quot;&gt;GitHub&lt;/a&gt;. Thank you!&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-3412746942826205485</guid>
         <pubDate>Sun, 12 Apr 2015 11:25:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://2.bp.blogspot.com/-CMqU1Mk6-A8/VSqMEZzRQ1I/AAAAAAAAJ5Q/wFg1g2zQJms/s72-c/opennsm-gofundme.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – March 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/XaCN-jHwCzo/monthly-blog-round-up-march-2015.html</link>
         <description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;&lt;ol&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. &lt;i&gt;[326 pageviews]&lt;/i&gt;&lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)&amp;nbsp;&lt;i&gt;[126 pageviews]&lt;/i&gt;&lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;)&amp;nbsp;&lt;i&gt;[111 pageviews]&lt;/i&gt;&lt;/li&gt;&lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;)&amp;nbsp;&lt;i&gt;[100+&amp;nbsp;pageviews to the main tag]&lt;/i&gt;&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases.&amp;nbsp;&lt;i&gt;[82 pageviews of total 4888 pageviews to all blog pages]&lt;/i&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security analytics&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/10/now-that-we-have-all-that-data-what-do-we-do-revisited/&quot;&gt;Now That We Have All That Data What Do We Do, Revisited&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/06/who-validates-alerts-validated-by-your-alert-validator-software/&quot;&gt;Who Validates Alerts Validated by Your Alert Validator Software?&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/03/03/killed-by-ai-much-a-rise-of-non-deterministic-security/&quot;&gt;Killed by AI Much? A Rise of Non-deterministic Security!&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/siem-dlp-add-on-brain/&quot;&gt;SIEM / DLP Add-on Brain&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/19/those-pesky-users-how-to-catch-bad-usage-of-good-accounts/&quot;&gt;Those Pesky Users: How To Catch Bad Usage of Good Accounts&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/09/security-analytics-lessons-learned-and-ignored/&quot;&gt;Security Analytics Lessons Learned — and Ignored!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/03/security-analytics-projects-vs-boxes-built-vs-buy/&quot;&gt;Security Analytics: Projects vs Boxes (Build vs Buy)?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security Analytics – Finally Emerging For Real?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/all-my-research-published-in-2014/&quot;&gt;All My Research Published in 2014&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br /&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/03/monthly-blog-round-up-february-2015.html&quot;&gt;Monthly Blog Round-Up – February 2015&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=XaCN-jHwCzo:WjGb9zNBGvQ:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=XaCN-jHwCzo:WjGb9zNBGvQ:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=XaCN-jHwCzo:WjGb9zNBGvQ:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/XaCN-jHwCzo&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8637652937415291210</guid>
         <pubDate>Thu, 02 Apr 2015 16:40:58 +0000</pubDate>
      </item>
      <item>
         <title>Richard Bejtlich:   The Attack on GitHub Must Stop</title>
         <link>http://taosecurity.blogspot.com/2015/03/the-attack-on-github-must-stop.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-6jotYO6nsZA/VRXkfhUppyI/AAAAAAAAJ4Q/BiGQbS10WGs/s1600/gh-ddos.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-6jotYO6nsZA/VRXkfhUppyI/AAAAAAAAJ4Q/BiGQbS10WGs/s1600/gh-ddos.jpg&quot; height=&quot;260&quot; width=&quot;400&quot;/&gt;&lt;/a&gt;&lt;/div&gt;For many years, private organizations in the West have endured attacks by the Chinese government, its proxies, and other parties. These intruders infiltrated private organizations to steal data. Those not associated with the targeted organizations were generally not directly affected.&lt;br /&gt;&lt;br /&gt;Today an action by the Chinese government is affecting millions of users around the world. This is unacceptable.&lt;br /&gt;&lt;br /&gt;You may be aware that an American technology company, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.github.com/&quot;&gt;GitHub&lt;/a&gt;, is suffering a massive distributed denial of service attack, at the time of writing.&lt;br /&gt;&lt;br /&gt;According to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://insight-labs.org/?p=1682&quot;&gt;Insight Labs&lt;/a&gt;, Internet traffic within China is being manipulated, such that users are essentially attacking GitHub. They are unwittingly requesting two sites hosted by GitHub. The first is a mirror of the Chinese edition of the New York Times (blocked for &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.forbes.com/sites/dougyoung/2015/03/23/chinese-fire-wall-slams-down-on-reuters/&quot;&gt;several years&lt;/a&gt;). The other is a mirror of the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.greatfire.org/&quot;&gt;GreatFire.org&lt;/a&gt; Web site, devoted to discovering and exposing Internet filtering by China's &quot;Great Firewall.&quot;&lt;br /&gt;&lt;br /&gt;As noted in this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://motherboard.vice.com/read/did-china-just-launch-a-cyber-attack-on-github&quot;&gt;Motherboard story&lt;/a&gt;, it's unlikely a party other than the Chinese government could sustain this attack, given the nature of the traffic injection within the country's routing infrastructure. Even if somehow this is not a state-executed or state-ordered attack, according to the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/2012/11/spectrum-of-state-responsibility.html&quot;&gt;spectrum of state responsibility&lt;/a&gt;, the Chinese government is clearly responsible in one form or another.&lt;br /&gt;&lt;br /&gt;It is reprehensible that the censorship policies and actions of a nation-state are affecting &quot;over 3.4 million users and with 16.7 million repositories... the largest code host in the world.&quot; (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://en.wikipedia.org/wiki/GitHub&quot;&gt;Source&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;The Chinese government is forcing GitHub to expend its private resources in order to continue serving its customers. I call on the US government, and like-minded governments and their associates, to tell the Chinese to immediately stop this activity. I also believe companies like IBM, who are&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.reuters.com/article/2015/03/23/us-china-tech-ibm-idUSKBN0MJ14X20150323&quot;&gt;signing massive IT deals&lt;/a&gt;&amp;nbsp;with &quot;Chinese partners,&quot; should reconsider these associations.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-4300231811360705370</guid>
         <pubDate>Fri, 27 Mar 2015 19:40:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-6jotYO6nsZA/VRXkfhUppyI/AAAAAAAAJ4Q/BiGQbS10WGs/s72-c/gh-ddos.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Can Interrogators Teach Digital Security Pros?</title>
         <link>http://taosecurity.blogspot.com/2015/03/can-interrogators-teach-digital-security.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-EV_vHBxHEU4/VRHHzTP2AcI/AAAAAAAAJ38/2GwILGlK9Bs/s1600/interrogate.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-EV_vHBxHEU4/VRHHzTP2AcI/AAAAAAAAJ38/2GwILGlK9Bs/s1600/interrogate.jpg&quot; height=&quot;237&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Recently Bloomberg published an article titled &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.bloomberg.com/graphics/2015-dark-science-of-interrogation/&quot;&gt;The Dark Science of Interrogation&lt;/a&gt;. I was fascinated by this article because I graduated from the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://en.wikipedia.org/wiki/Survival,_Evasion,_Resistance_and_Escape&quot;&gt;SERE&lt;/a&gt; program at the US Air Force Academy in the summer of 1991, after my freshman year there. SERE teaches how to resist the interrogation methods used against prisoners of war. When I attended the school, the content was based on techniques used by Korea and Vietnam against American POWs in the 1950s-1970s.&lt;br /&gt;&lt;br /&gt;As I read the article, I realized the subject matter reminded me of another aspect of my professional life.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;In intelligence, as in the most mundane office setting, some of the most valuable information still comes from face-to-face conversations across a table. In police work, a successful interrogation can be the difference between a closed case and a cold one. &lt;b&gt;Yet officers today are taught techniques that have never been tested in a scientific setting. For the most part, interrogators rely on nothing more than intuition, experience, and a grab bag of passed-down methods.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;“Most police officers can tell you how many feet per second a bullet travels. They know about ballistics and cavity expansion with a hollow-point round,”&lt;/b&gt; says Mark Fallon, a former Naval Criminal Investigative Service special agent who led the investigation into the USS Cole attack and was assistant director of the federal government’s main law enforcement training facility. &lt;b&gt;“What as a community we have not yet embraced as effectively is the behavioral sciences...”&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Christian Meissner, a psychologist at Iowa State University, coordinates much of HIG’s research. &lt;b&gt;“The goal,” he says, “is to go from theory and science,&lt;/b&gt; what we know about human communication and memory, what we know about social influence and developing cooperation and rapport, &lt;b&gt;and to translate that into methods that can be scientifically validated.”&lt;/b&gt; Then it’s up to Kleinman, Fallon, and other interested investigators to &lt;b&gt;test the findings in the real world and see what works, what doesn’t, and what might actually backfire.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Does this sound familiar? Security people know how many flags to check in a TCP header, or how many bytes to offset when writing shell code, but we don't seem to &quot;know&quot; (in a &quot;scientific&quot; sense) how to &quot;secure&quot; data, networks, and so on.&lt;br /&gt;&lt;br /&gt;One point of bright light is the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://securitymetrics.org/&quot;&gt;Security Metrics community&lt;/a&gt;. The mailing list is always interesting for those trying to bring counting and &quot;science&quot; to the digital security profession. Another great project is the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.cybersecurityindex.org/&quot;&gt;Index of Cyber Security&lt;/a&gt; run by Dan Geer and Mukul Pareek.&lt;br /&gt;&lt;br /&gt;I'm not saying there is a &quot;science&quot; of digital security. Others will disagree. I also don't have any specific recommendations based on what I read in the interrogation article. However, I did resonate with the article's message that &quot;street wisdom&quot; needs to be checked to see if it actually works. Scientific methods can help.&lt;br /&gt;&lt;br /&gt;I am taking small steps in that direction with my PhD in the war studies department at King's College London.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-3002876630288984955</guid>
         <pubDate>Tue, 24 Mar 2015 16:38:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-EV_vHBxHEU4/VRHHzTP2AcI/AAAAAAAAJ38/2GwILGlK9Bs/s72-c/interrogate.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – February 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/F3TtfqaiDlE/monthly-blog-round-up-february-2015.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; requires &lt;em&gt;a lot&lt;/em&gt; of work, whether you paid for the software, or not. &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;)  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases. &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br&gt;&lt;br&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security analytics&lt;/a&gt;:&lt;/strong&gt;&lt;/div&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/siem-dlp-add-on-brain/&quot;&gt;SIEM / DLP Add-on Brain&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/19/those-pesky-users-how-to-catch-bad-usage-of-good-accounts/&quot;&gt;Those Pesky Users: How To Catch Bad Usage of Good Accounts&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/09/security-analytics-lessons-learned-and-ignored/&quot;&gt;Security Analytics Lessons Learned — and Ignored!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/02/03/security-analytics-projects-vs-boxes-built-vs-buy/&quot;&gt;Security Analytics: Projects vs Boxes (Build vs Buy)?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security Analytics – Finally Emerging For Real?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;br&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/all-my-research-published-in-2014/&quot;&gt;All My Research Published in 2014&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/02/monthly-blog-round-up-january-2015.html&quot;&gt;Monthly Blog Round-Up – January 2015&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=F3TtfqaiDlE:5gb71ez0sYo:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=F3TtfqaiDlE:5gb71ez0sYo:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=F3TtfqaiDlE:5gb71ez0sYo:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/F3TtfqaiDlE&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-3388919867852360669</guid>
         <pubDate>Tue, 03 Mar 2015 04:01:32 +0000</pubDate>
      </item>
      <item>
         <title>Richard Bejtlich:   Why Would Iran Welcome Western Tech?</title>
         <link>http://taosecurity.blogspot.com/2015/03/why-would-iran-welcome-western-tech.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-HxNujxNTKWs/VPUiL6BBdEI/AAAAAAAAJw0/v9ZXEIPbFcQ/s1600/ajz.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-HxNujxNTKWs/VPUiL6BBdEI/AAAAAAAAJw0/v9ZXEIPbFcQ/s1600/ajz.jpg&quot; height=&quot;320&quot; width=&quot;313&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I noticed an AFP story posted by&amp;nbsp;Al Jazeera America titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://america.aljazeera.com/articles/2015/3/1/iran-could-allow-in-google.html&quot;&gt;Iran could allow in Google, other tech companies if they follow rules&lt;/a&gt;. It included the following:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Iran could allow Internet giants such as Google to operate in the the  country if they respect its &quot;cultural&quot; rules, Fars news agency said on  Sunday, quoting a senior official.&lt;br /&gt;&lt;br /&gt;&quot;We are not opposed to any of the entities operating in global markets  who want to offer services in Iran,&quot; Deputy Telecommunications and  Information Technology Minister Nasrollah Jahangard reportedly told  Fars.&lt;br /&gt;&lt;br /&gt;&quot;We are ready to negotiate with them and if they accept our cultural  rules and policies they can offer their services in Iran,&quot; he said.&lt;br /&gt;&lt;br /&gt;Jahangard said Iran is &quot;also ready to provide Google or any other  company with facilities&quot; that could enable them to provide their  services to the region.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;These statements caught my eye because they contrast with China's actions, in the opposite direction. For example, on Friday the Washington Post published&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.washingtonpost.com/world/china-bars-top-us-technology-firms-from-government-list/2015/02/26/ebd4282c-bda1-11e4-9dfb-03366e719af8_story.html&quot;&gt;China removes top U.S. tech firms from government purchasing list&lt;/a&gt;, which said in part:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;China has dropped several top U.S. technology companies, including Cisco and Apple, from a list of brands that are approved for state purchases, amid a widening rift with the United States about cyberspace...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Other companies dropped included Apple, Intel’s McAfee security software firm, and network and server software company Citrix Systems. Hewlett-&lt;/i&gt;&lt;i&gt;Packard and Dell products remained on the list.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;“The main reason for dropping foreign brands is out of national security. It’s the effect of Snowden and PRISM,” said Mei Xinyu, a researcher with the Ministry of Commerce. “When it comes to national security, no country should let their guard down.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;So why would Iran &quot;let their guard down,&quot; to use Mei Xinyu's suggestion?&lt;br /&gt;&lt;br /&gt;It's possible Iran is trying to encourage a favorable resolution to the nuclear power negotiations currently underway. I don't think its stance on technology is going to move the negotiations one way or another, however.&lt;br /&gt;&lt;br /&gt;It's more likely that Iran recognizes that it lacks the sorts of national champions found in China. Iran isn't at the point where a local version of Cisco or Apple could replace the American brands. China, in contrast, has&amp;nbsp;Huawei and ZTE for telecoms and&amp;nbsp;Xiaomi (and others) for smartphones.&lt;br /&gt;&lt;br /&gt;Iran might also be smart enough to realize that American brands could be the &quot;safest&quot; and most &quot;secure&quot; brands available, given the resistance of American tech companies to perceptions that they work on behalf of the US intelligence community.&lt;br /&gt;&lt;br /&gt;At the New America cyber event last week, Bruce Schneier noted that the Cold War mission of the NSA was to &quot;attack their stuff, and defend our stuff.&quot; However, when we &quot;all use the same stuff,&quot; it's tougher for the NSA to follow its Cold War methodology.&lt;br /&gt;&lt;br /&gt;I stated several times last week in various locations that countries like China who adopt their own national tech champions are essentially restoring the Cold War situation. If China rejects American technology, and runs its own, it will once again be possible for the NSA to &quot;attack their stuff, and defend our stuff.&quot;&lt;br /&gt;&lt;br /&gt;In that respect, I encourage the Chinese to run their own gear.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-103253034074382752</guid>
         <pubDate>Mon, 02 Mar 2015 22:10:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://3.bp.blogspot.com/-HxNujxNTKWs/VPUiL6BBdEI/AAAAAAAAJw0/v9ZXEIPbFcQ/s72-c/ajz.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Boards Not Briefed on Strategy?</title>
         <link>http://taosecurity.blogspot.com/2015/02/boards-not-briefed-on-strategy.html</link>
         <description>&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-psJFX5KgJGQ/VOYeKv9urZI/AAAAAAAAJtA/XKicRfUBwg4/s1600/csm.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-psJFX5KgJGQ/VOYeKv9urZI/AAAAAAAAJtA/XKicRfUBwg4/s1600/csm.jpg&quot; height=&quot;293&quot; width=&quot;320&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I'd like to make a quick note on strategy, after reading&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.csmonitor.com/World/Passcode/2015/0219/After-high-profile-hacks-many-companies-still-nonchalant-about-cybersecurity&quot;&gt;After high-profile hacks, many companies still nonchalant about cybersecurity&lt;/a&gt; in the Christian Science Monitor today. The article says:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;In a survey&amp;nbsp;commissioned by defense contractor &lt;a rel=&quot;nofollow&quot; class=&quot;inform_link&quot; target=&quot;_blank&quot; href=&quot;http://www.csmonitor.com/csmlists/topic/Raytheon+Company&quot; title=&quot;Title: Raytheon Company&quot;&gt;Raytheon&lt;/a&gt; of 1,006 chief information officers,&amp;nbsp;chief information security  officers, and other technology executives, &lt;b&gt;78 percent said their boards  had not been briefed even once on their organization’s cybersecurity  strategy&lt;/b&gt; over the past 12 months...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;The findings are similar to those reported by PricewaterhouseCoopers in its Global State of Information Security Survey last year in which &lt;b&gt;fewer that 42 percent of respondents said their board actively participates in overall security strategy&lt;/b&gt;.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Does this worry you? Do you want to introduce strategic thinking into your board discussion? If the answer is yes, consider these resources.&lt;br /&gt;&lt;br /&gt;1. Check out my earlier blog posts on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/search/label/strategy&quot;&gt;strategy&lt;/a&gt;, especially the first two articles.&lt;br /&gt;&lt;br /&gt;2. Watch the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.youtube.com/watch?v=7GCC-0a_mVs&quot;&gt;keynote I delivered at ArchC0n&lt;/a&gt; last year. My section starts around 8:30.&lt;br /&gt;&lt;br /&gt;3. For those who want to apply strategic thought to network security monitoring, I addressed that in a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.youtube.com/watch?v=MPY_oh404OI&quot;&gt;Webcast for O'Reilly&lt;/a&gt; last year.&lt;br /&gt;&lt;br /&gt;At the end of the day, we need to be talking in strategic terms with business leaders, not technical terms. They are not having the conversations they need, and too few of us know how to speak a language that aligns with their interests and goals.&lt;br /&gt;&lt;br /&gt;We need to convince boards and CxOs that we are understand their goals, and that security teams are implementing the correct strategy and running the right campaigns to achieve business objectives. We should not be talking to them about the tactics and tools to support the strategy and campaigns. Sell executives on your strategy, not your technical knowledge.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-2331036269780875419</guid>
         <pubDate>Thu, 19 Feb 2015 12:43:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-psJFX5KgJGQ/VOYeKv9urZI/AAAAAAAAJtA/XKicRfUBwg4/s72-c/csm.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Richard Bejtlich:   Elevating the Discussion on Security Incidents</title>
         <link>http://taosecurity.blogspot.com/2015/02/elevating-discussion-on-security.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-yZxWABug_48/VOYIlK8w-aI/AAAAAAAAJso/2kOixYMsOGs/s1600/jt.jpg&quot; style=&quot;clear:left;float:left;margin-bottom:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-yZxWABug_48/VOYIlK8w-aI/AAAAAAAAJso/2kOixYMsOGs/s1600/jt.jpg&quot; height=&quot;320&quot; width=&quot;251&quot;/&gt;&lt;/a&gt;&lt;/div&gt;I am not a fan of the way many media sources cite &quot;statistics&quot; on digital security incidents. I've noted before that any &quot;statistic&quot; using the terms &quot;millions&quot; or &quot;billions&quot; to describe &quot;attacks&quot; is probably worthless.&lt;br /&gt;&lt;br /&gt;This week, two articles on security incidents caught my attention. First, I'd like to discuss the story at left, published 17 February in The Japan Times, titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.japantimes.co.jp/news/2015/02/17/national/crime-legal/cyberattacks-detected-in-japan-doubled-to-25-7-billion-in-2014/&quot;&gt;Cyberattacks detected in Japan doubled to 25.7 billion in 2014&lt;/a&gt;. It included the following:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The number of computer attacks on government and other organizations detected in Japan doubled in 2014 from the previous year to a record &lt;b&gt;25.66 billion&lt;/b&gt;, a government agency said Tuesday.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;The National Institute of Information and Communications Technology used around 240,000 sensors to detect cyberattacks...&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Among countries to which perpetrators’ Internet Protocol addresses were traced, China accounted for the largest share at 40 percent, while South Korea, Russia and the United States also ranked high.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;NICT launched a survey on cyberattacks in Japan in 2005, when the number of such incidents stood at around 310 million. The number rose to about 5.65 billion in 2010 and to 7.79 billion in 2012.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;25.66 billion &quot;computer attacks&quot;? That seems ridiculous at first glance. Based on observations from &quot;around 240,000 sensors,&quot; that's over 100,000 &quot;attacks&quot; per sensor per year, or nearly 300 per sensor per day. That still seems excessive, although getting closer to an order of magnitude that might make sense.&lt;br /&gt;&lt;br /&gt;You might find the trend line more interesting, i.e., 310 million to 5.65 billion to 7.79 billion to 25.66 billion. However, it is important to adjust for increased visibility at each point. I doubt that 240,000 sensors were operating prior to 2014.&lt;br /&gt;&lt;br /&gt;(On a secondary note, I'm not thrilled by the section saying that Chinese IP addresses accounted for 40% of the &quot;attacks.&quot; While that may be a &quot;fact,&quot; it doesn't say anything by itself that helps with attribution.)&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-TALvZCJuttk/VOYJBWLBeTI/AAAAAAAAJsw/EA-FtEMCzeA/s1600/re.jpg&quot; style=&quot;clear:right;float:right;margin-bottom:1em;margin-left:1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-TALvZCJuttk/VOYJBWLBeTI/AAAAAAAAJsw/EA-FtEMCzeA/s1600/re.jpg&quot; height=&quot;320&quot; width=&quot;240&quot;/&gt;&lt;/a&gt;&lt;/div&gt;Nevertheless, talking about individual &quot;attacks,&quot; especially when counting them discretely, is outmoded thinking, in my opinion. &quot;Attacks&quot; could include anything from transmitting a TCP segment to a specific port, to attempting SQL injection on a Web site, to sending a phishing email.&lt;br /&gt;&lt;br /&gt;If properly defined, &quot;attacks&quot; become somewhat interesting, but their value as indicators should extend beyond being simple atomic events.&lt;br /&gt;&lt;br /&gt;I was much more encouraged by the second article, at right, published 18 February by Reuters, titled&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.reuters.com/article/2015/02/19/us-lockheed-cybersecurity-idUSKBN0LN03K20150219&quot;&gt;Lockheed sees double-digit growth in cyber business&lt;/a&gt;. It included the following:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;[Chief Executive Officer Marillyn] Hewson told the company's annual media day that Lockheed had faced &lt;b&gt;50&lt;/b&gt; &quot;coordinated, sophisticated &lt;b&gt;campaign&lt;/b&gt;&quot; attacks by hackers in 2014 alone, and she expected those threats to continue growing.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;The use of the term &quot;campaign&quot; is significant here. Campaign aligns with the operational level of war, between Tactics and Strategy. (Tactics are employed as actions at the individual battle or skirmish level, while Strategy describes matching ways and means to achieve specific ends. See my posts on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://taosecurity.blogspot.com/search/label/strategy&quot;&gt;strategy&lt;/a&gt; for more.)&lt;br /&gt;&lt;br /&gt;Campaigns are sets of activities pursued over days, weeks, months, and even years to accomplish strategic and policy goals. The term campaign indicates purpose, applied over an extended period of time. When the LM CEO speaks in these terms, she shows that her security team is thinking at an advanced level, likely aligning campaigns with specific threat actors and motives.&lt;br /&gt;&lt;br /&gt;When a CEO talks about 50 campaigns, she can have a more meaningful discussion with the executives and board. She can talk about threat actors behind the campaigns, what happened during each campaign, and how the team detected and responded to them. The term Campaign also matches well with business operations; think of &quot;marketing campaigns,&quot; &quot;sales campaigns,&quot; etc.&lt;br /&gt;&lt;br /&gt;I would very much like to see security teams, officials, and others think and talk about campaigns in the future, and place statistics on &quot;attacks&quot; in proper context. Note that some threat researchers talk about campaigns when they write reports on adversary activity, so that is a good sign already.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;twitter-share-button&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Copyright 2003-2015 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)&lt;/div&gt;</description>
         <author>Richard Bejtlich</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-4088979.post-7645020699566648421</guid>
         <pubDate>Thu, 19 Feb 2015 11:20:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-yZxWABug_48/VOYIlK8w-aI/AAAAAAAAJso/2kOixYMsOGs/s72-c/jt.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – January 2015</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/YdBvzg7he1Y/monthly-blog-round-up-january-2015.html</link>
         <description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;&lt;ol&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/&quot;&gt;open source&lt;/a&gt;&amp;nbsp;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.graylog2.org/&quot;&gt;tools&lt;/a&gt;, BTW, does not break the logic of that post. &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases.  &lt;/li&gt;&lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/analytics/&quot;&gt;security analytics&lt;/a&gt;:&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/26/do-you-want-security-analytics-or-do-you-just-hate-your-siem/&quot;&gt;Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/12/security-analytics-finally-emerging-for-real/&quot;&gt;Security Analytics – Finally Emerging For Real?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Past research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/mssp/&quot;&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/30/my-how-to-work-with-an-mssp-to-improve-security-paper-publishes/&quot;&gt;My “How to Work With an MSSP to Improve Security” Paper Publishes&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/12/16/should-i-use-siem-x-or-mssp-y/&quot;&gt;Should I Use “SIEM X” or “MSSP Y”?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/12/12/how-to-exit-an-mssp-relationship/&quot;&gt;How To Exit an MSSP Relationship?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/11/14/mssp-client-onboarding-a-critical-process/&quot;&gt;MSSP Client Onboarding – A Critical Process!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/11/05/mssp-integrate-not-outsource/&quot;&gt;MSSP: Integrate, NOT Outsource!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/28/on-mssp-personnel/&quot;&gt;On MSSP Personnel&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/23/on-mssp-slas/&quot;&gt;On MSSP SLAs&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/16/acting-on-mssp-alerts/&quot;&gt;Acting on MSSP Alerts&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/09/mssp-client-responsibilities-what-are-they/&quot;&gt;MSSP Client Responsibilities – What Are They?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/27/find-security-that-oursources-badly/&quot;&gt;Find Security That Outsources Badly!&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/10/challenges-with-mssps/&quot;&gt;Challenges with MSSPs?&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/03/how-to-work-with-an-mssp-effectively/&quot;&gt;How To Work With An MSSP Effectively?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/&quot;&gt;Defeat The Casual Attacker First!!&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;br /&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/annual-blog-round-up-2014.html&quot;&gt;2014&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2015/01/monthly-blog-round-up-december-2014.html&quot;&gt;Monthly Blog Round-Up – December 2014&lt;/a&gt; &lt;/li&gt;&lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=YdBvzg7he1Y:tjpmWsKNQuI:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=YdBvzg7he1Y:tjpmWsKNQuI:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=YdBvzg7he1Y:tjpmWsKNQuI:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/YdBvzg7he1Y&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4634779664414590574</guid>
         <pubDate>Mon, 02 Feb 2015 23:59:08 +0000</pubDate>
      </item>
      <item>
         <title>by Annual Blog Round-Up – 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/ZvAAtt2osUk/annual-blog-round-up-2014.html</link>
         <description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align:left;&quot;&gt;Here is my &lt;strong&gt;annual &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 10 popular posts/topics in 2014. &lt;br /&gt;&lt;ol&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://logstash.net/&quot;&gt;open sources&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search tools&lt;/a&gt; (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.elasticsearch.org/overview/elkdownloads/&quot;&gt;ELK FTW&lt;/a&gt;!), BTW, does not break the logic of that post. &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases. &lt;/li&gt;&lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always hot! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 in 2015 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;)&amp;nbsp; &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; tools, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html&quot;&gt;SANS Top 6 Log Reports Reborn!&lt;/a&gt; highlights the re-release of top most popular log reports list. &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2845417&quot;&gt;here in this paper&lt;/a&gt;).  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/05/my-best-pci-dss-presentation-ever.html&quot;&gt;“My Best PCI DSS Presentation EVER!”&lt;/a&gt; is my conference presentation where I make a passionate claim that PCI DSS is actually useful for security (do read &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info/&quot;&gt;the PCI book&lt;/a&gt; as well)!  &lt;/li&gt;&lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/04/on-choosing-siem.html&quot;&gt;On Choosing SIEM&lt;/a&gt;” is about &lt;em&gt;the least wrong way&lt;/em&gt; of choosing a SIEM tool – as well as about why the right way is so unpopular.  &lt;/li&gt;&lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/11/how-to-write-ok-siem-rfp.html&quot;&gt;“How to Write an OK SIEM RFP?”&lt;/a&gt; (from 2010) contains Anton’s least hated &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; RFP writing tips (I don’t have the favorite tips since I hate the RFP process)&lt;/li&gt;&lt;/ol&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: all this content was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;. &lt;br /&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;br /&gt;  &lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=ZvAAtt2osUk:kZ-Ksr6NzFc:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=ZvAAtt2osUk:kZ-Ksr6NzFc:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=ZvAAtt2osUk:kZ-Ksr6NzFc:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/ZvAAtt2osUk&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-2127803326221876208</guid>
         <pubDate>Tue, 20 Jan 2015 18:19:30 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – December 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/6sCb0_gTYwg/monthly-blog-round-up-december-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://logstash.net/&quot;&gt;open sources&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search tools&lt;/a&gt;, BTW, does not break the logic of that post.&lt;/li&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;) &lt;/li&gt; &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;)&amp;nbsp; &lt;/li&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases. &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/mssp/&quot;&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/12/16/should-i-use-siem-x-or-mssp-y/&quot;&gt;Should I Use “SIEM X” or “MSSP Y”?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/12/12/how-to-exit-an-mssp-relationship/&quot;&gt;How To Exit an MSSP Relationship?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/11/14/mssp-client-onboarding-a-critical-process/&quot;&gt;MSSP Client Onboarding – A Critical Process!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/11/05/mssp-integrate-not-outsource/&quot;&gt;MSSP: Integrate, NOT Outsource!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/28/on-mssp-personnel/&quot;&gt;On MSSP Personnel&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/23/on-mssp-slas/&quot;&gt;On MSSP SLAs&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/16/acting-on-mssp-alerts/&quot;&gt;Acting on MSSP Alerts&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/09/mssp-client-responsibilities-what-are-they/&quot;&gt;MSSP Client Responsibilities – What Are They?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/27/find-security-that-oursources-badly/&quot;&gt;Find Security That Outsources Badly!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/10/challenges-with-mssps/&quot;&gt;Challenges with MSSPs?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/03/how-to-work-with-an-mssp-effectively/&quot;&gt;How To Work With An MSSP Effectively?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/12/bye-bye-compliance-thinking-welcome-military-thinking/&quot;&gt;Bye-bye, Compliance Thinking. Welcome, Military Thinking!&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/12/monthly-blog-round-up-november-2014.html&quot;&gt;Monthly Blog Round-Up – November 2014&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=6sCb0_gTYwg:hEildZQQXmg:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=6sCb0_gTYwg:hEildZQQXmg:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=6sCb0_gTYwg:hEildZQQXmg:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/6sCb0_gTYwg&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-1177857147296817333</guid>
         <pubDate>Tue, 06 Jan 2015 22:34:38 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – November 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/XUETeBwtfNk/monthly-blog-round-up-november-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.sg/2009/09/donn-parkers-risks-of-risk-based.html&quot;&gt;“Donn Parker’s “Risks of Risk-Based Security” Summarized”&lt;/a&gt;, an old blog post from 2009, somehow made it to my top list this month. A mystery! &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list of popular &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; use cases.  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; and mentioned in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info&quot;&gt;our PCI book&lt;/a&gt; (just out in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/&quot;&gt;its 4th edition!&lt;/a&gt;)&amp;nbsp; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/mssp/&quot;&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/11/14/mssp-client-onboarding-a-critical-process/&quot;&gt;MSSP Client Onboarding – A Critical Process!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/11/05/mssp-integrate-not-outsource/&quot;&gt;MSSP: Integrate, NOT Outsource!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/28/on-mssp-personnel/&quot;&gt;On MSSP Personnel&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/23/on-mssp-slas/&quot;&gt;On MSSP SLAs&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/16/acting-on-mssp-alerts/&quot;&gt;Acting on MSSP Alerts&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/09/mssp-client-responsibilities-what-are-they/&quot;&gt;MSSP Client Responsibilities – What Are They?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/27/find-security-that-oursources-badly/&quot;&gt;Find Security That Outsources Badly!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/10/challenges-with-mssps/&quot;&gt;Challenges with MSSPs?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/03/how-to-work-with-an-mssp-effectively/&quot;&gt;How To Work With An MSSP Effectively?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/20/security-essentials-basics-fundamentals-bare-minimum/&quot;&gt;Security Essentials? Basics? Fundamentals? Bare Minimum?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/11/monthly-blog-round-up-october-2014.html&quot;&gt;Monthly Blog Round-Up – October 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=XUETeBwtfNk:3igR2692v_E:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=XUETeBwtfNk:3igR2692v_E:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=XUETeBwtfNk:3igR2692v_E:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/XUETeBwtfNk&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-7278288524167399694</guid>
         <pubDate>Mon, 01 Dec 2014 16:50:49 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – October 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/gA8R87Sja7k/monthly-blog-round-up-october-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2295616&quot;&gt;here&lt;/a&gt;). &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/mssp/&quot;&gt;MSSP&lt;/a&gt;:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/28/on-mssp-personnel/&quot;&gt;On MSSP Personnel&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/23/on-mssp-slas/&quot;&gt;On MSSP SLAs&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/16/acting-on-mssp-alerts/&quot;&gt;Acting on MSSP Alerts&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/10/09/mssp-client-responsibilities-what-are-they/&quot;&gt;MSSP Client Responsibilities – What Are They?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/27/find-security-that-oursources-badly/&quot;&gt;Find Security That Outsources Badly!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/10/challenges-with-mssps/&quot;&gt;Challenges with MSSPs?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/03/how-to-work-with-an-mssp-effectively/&quot;&gt;How To Work With An MSSP Effectively?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Previous research on SIEM:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/19/my-updated-siem-technology-assessment-and-select-vendor-profiles-publishes/&quot;&gt;My UPDATED “SIEM Technology Assessment and Select Vendor Profiles” Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/15/my-updated-security-information-and-event-management-architecture-and-operational-processes-publishes/&quot;&gt;My UPDATED “Security Information and Event Management Architecture and Operational Processes” Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;My Evaluation Criteria for Security Information and Event Management Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/22/my-blueprint-for-designing-a-siem-deployment-publishes/&quot;&gt;My Blueprint for Designing a SIEM Deployment Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/30/siem-real-time-and-historical-analytics-collide/&quot;&gt;SIEM Real-time and Historical Analytics Collide?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/24/siem-and-badness-detection/&quot;&gt;SIEM and Badness Detection&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/17/stop-the-pain-thinking-vs-the-use-case-thinking/&quot;&gt;“Stop The Pain” Thinking vs the Use Case Thinking&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/06/siem-analytics-histories-and-lessons/&quot;&gt;SIEM Analytics Histories and Lessons&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;Popular SIEM Starter Use Cases&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;Detailed SIEM Use Case Example&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/20/security-essentials-basics-fundamentals-bare-minimum/&quot;&gt;Security Essentials? Basics? Fundamentals? Bare Minimum?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/10/monthly-blog-round-up-september-2014.html&quot;&gt;Monthly Blog Round-Up – September 2014&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=gA8R87Sja7k:xIE69AMGsYo:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=gA8R87Sja7k:xIE69AMGsYo:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=gA8R87Sja7k:xIE69AMGsYo:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/gA8R87Sja7k&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-5259235249855761467</guid>
         <pubDate>Sat, 01 Nov 2014 18:11:00 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – September 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/UtNSWCjOFPs/monthly-blog-round-up-september-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;) &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2295616&quot;&gt;here&lt;/a&gt;). &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on MSSPs:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/27/find-security-that-oursources-badly/&quot;&gt;Find Security That Outsources Badly!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/10/challenges-with-mssps/&quot;&gt;Challenges with MSSPs?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/03/how-to-work-with-an-mssp-effectively/&quot;&gt;How To Work With An MSSP Effectively?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Previous research on SIEM:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/19/my-updated-siem-technology-assessment-and-select-vendor-profiles-publishes/&quot;&gt;My UPDATED “SIEM Technology Assessment and Select Vendor Profiles” Publishes&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/09/15/my-updated-security-information-and-event-management-architecture-and-operational-processes-publishes/&quot;&gt;My UPDATED “Security Information and Event Management Architecture and Operational Processes” Publishes&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;My Evaluation Criteria for Security Information and Event Management Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/22/my-blueprint-for-designing-a-siem-deployment-publishes/&quot;&gt;My Blueprint for Designing a SIEM Deployment Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/30/siem-real-time-and-historical-analytics-collide/&quot;&gt;SIEM Real-time and Historical Analytics Collide?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/24/siem-and-badness-detection/&quot;&gt;SIEM and Badness Detection&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/17/stop-the-pain-thinking-vs-the-use-case-thinking/&quot;&gt;“Stop The Pain” Thinking vs the Use Case Thinking&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/14/more-on-siem-maturity-and-request-for-feedback/&quot;&gt;More on SIEM Maturity – And Request for Feedback!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/17/on-siem-tool-and-operation-metrics/&quot;&gt;On SIEM Tool and Operation Metrics&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/06/siem-analytics-histories-and-lessons/&quot;&gt;SIEM Analytics Histories and Lessons&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;Popular SIEM Starter Use Cases&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;Detailed SIEM Use Case Example&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/02/back-to-siem-research/&quot;&gt;Back to SIEM Research!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/14/siem-webinar-questions-answered/&quot;&gt;SIEM Webinar Questions – Answered&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/20/security-essentials-basics-fundamentals-bare-minimum/&quot;&gt;Security Essentials? Basics? Fundamentals? Bare Minimum?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see all my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/09/monthly-blog-round-up-august-2014.html&quot;&gt;Monthly Blog Round-Up – August 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=UtNSWCjOFPs:37EL1I4zL74:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=UtNSWCjOFPs:37EL1I4zL74:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=UtNSWCjOFPs:37EL1I4zL74:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/UtNSWCjOFPs&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8155760563476746176</guid>
         <pubDate>Wed, 01 Oct 2014 15:20:02 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – August 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/xiFx4m56pQ4/monthly-blog-round-up-august-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list.  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2295616&quot;&gt;here&lt;/a&gt;). &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011 (for my recent work on evaluating &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;this document&lt;/a&gt;)&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on SIEM:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/30/siem-real-time-and-historical-analytics-collide/&quot;&gt;SIEM Real-time and Historical Analytics Collide?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/24/siem-and-badness-detection/&quot;&gt;SIEM and Badness Detection&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/22/my-blueprint-for-designing-a-siem-deployment-publishes/&quot;&gt;My Blueprint for Designing a SIEM Deployment Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/17/stop-the-pain-thinking-vs-the-use-case-thinking/&quot;&gt;“Stop The Pain” Thinking vs the Use Case Thinking&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/14/more-on-siem-maturity-and-request-for-feedback/&quot;&gt;More on SIEM Maturity – And Request for Feedback!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;My Evaluation Criteria for Security Information and Event Management Publishes&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/17/on-siem-tool-and-operation-metrics/&quot;&gt;On SIEM Tool and Operation Metrics&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/06/siem-analytics-histories-and-lessons/&quot;&gt;SIEM Analytics Histories and Lessons&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;Popular SIEM Starter Use Cases&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;Detailed SIEM Use Case Example&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/02/back-to-siem-research/&quot;&gt;Back to SIEM Research!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/14/siem-webinar-questions-answered/&quot;&gt;SIEM Webinar Questions – Answered&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/20/security-essentials-basics-fundamentals-bare-minimum/&quot;&gt;Security Essentials? Basics? Fundamentals? Bare Minimum?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/08/monthly-blog-round-up-july-2014.html&quot;&gt;Monthly Blog Round-Up – July 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=xiFx4m56pQ4:xGANn1Am9sY:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=xiFx4m56pQ4:xGANn1Am9sY:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=xiFx4m56pQ4:xGANn1Am9sY:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/xiFx4m56pQ4&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-2389862201923647339</guid>
         <pubDate>Tue, 02 Sep 2014 17:46:52 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – July 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/GnWn6y724ko/monthly-blog-round-up-july-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list.  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2295616&quot;&gt;here&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on SIEM:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/30/siem-real-time-and-historical-analytics-collide/&quot;&gt;SIEM Real-time and Historical Analytics Collide?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/24/siem-and-badness-detection/&quot;&gt;SIEM and Badness Detection&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/22/my-blueprint-for-designing-a-siem-deployment-publishes/&quot;&gt;My Blueprint for Designing a SIEM Deployment Publishes&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/17/stop-the-pain-thinking-vs-the-use-case-thinking/&quot;&gt;“Stop The Pain” Thinking vs the Use Case Thinking&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/14/more-on-siem-maturity-and-request-for-feedback/&quot;&gt;More on SIEM Maturity – And Request for Feedback!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/02/my-evaluation-criteria-for-security-information-and-event-management-publishes/&quot;&gt;My Evaluation Criteria for Security Information and Event Management Publishes&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/17/on-siem-tool-and-operation-metrics/&quot;&gt;On SIEM Tool and Operation Metrics&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/06/siem-analytics-histories-and-lessons/&quot;&gt;SIEM Analytics Histories and Lessons&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;Popular SIEM Starter Use Cases&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;Detailed SIEM Use Case Example&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/02/back-to-siem-research/&quot;&gt;Back to SIEM Research!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/14/siem-webinar-questions-answered/&quot;&gt;SIEM Webinar Questions – Answered&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/07/08/why-no-security-analytics-market/&quot;&gt;Why No Security Analytics Market?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/20/security-essentials-basics-fundamentals-bare-minimum/&quot;&gt;Security Essentials? Basics? Fundamentals? Bare Minimum?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/07/monthly-blog-round-up-june-2014.html&quot;&gt;Monthly Blog Round-Up – June 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=GnWn6y724ko:AJfQ-l6-sbk:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=GnWn6y724ko:AJfQ-l6-sbk:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=GnWn6y724ko:AJfQ-l6-sbk:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/GnWn6y724ko&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8818956414925406203</guid>
         <pubDate>Fri, 01 Aug 2014 15:10:54 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – June 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/okp1NSEwL5s/monthly-blog-round-up-june-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&amp;nbsp; Current emergence of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://logstash.net/&quot;&gt;open sources&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://code.google.com/p/enterprise-log-search-and-archive/&quot;&gt;log search tools&lt;/a&gt;, BTW, does not break the logic of that post. &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list.  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on SIEM:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/17/on-siem-tool-and-operation-metrics/&quot;&gt;On SIEM Tool and Operation Metrics&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/06/siem-analytics-histories-and-lessons/&quot;&gt;SIEM Analytics Histories and Lessons&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;Popular SIEM Starter Use Cases&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;Detailed SIEM Use Case Example&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/02/back-to-siem-research/&quot;&gt;Back to SIEM Research!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/14/siem-webinar-questions-answered/&quot;&gt;SIEM Webinar Questions – Answered&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Previous research on threat intelligence (TI):&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/15/my-threat-intelligence-and-threat-assessment-research-papers-publish/&quot;&gt;My Threat Intelligence and Threat Assessment Research Papers Publish&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/16/threat-assessment-a-tough-subject-and-sharks-with-fricking-lasers/&quot;&gt;Threat Assessment – A Tough Subject (And Sharks with Fricking Lasers!)&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/31/on-threat-intelligence-management-platforms/&quot;&gt;On Threat Intelligence Management Platforms&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/20/on-internally-sourced-threat-intelligence/&quot;&gt;On Internally-sourced Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/14/delving-into-threat-actor-profiles/&quot;&gt;Delving into Threat Actor Profiles&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/26/on-threat-intelligence-sources/&quot;&gt;On Threat Intelligence Sources&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/19/how-to-make-better-threat-intelligence-out-of-threat-intelligence-data/&quot;&gt;How to Make Better Threat Intelligence Out of Threat Intelligence Data?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/04/on-threat-intelligence-use-cases/&quot;&gt;On Threat Intelligence Use Cases&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/30/on-broad-types-of-threat-intelligence/&quot;&gt;On Broad Types of Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/&quot;&gt;Threat Intelligence is NOT Signatures!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/15/the-conundrum-of-two-intelligences/&quot;&gt;The Conundrum of Two Intelligences!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/07/on-comparing-threat-intelligence-feeds/&quot;&gt;On Comparing Threat Intelligence Feeds&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/03/22/consumption-of-shared-security-data/&quot;&gt;Consumption of Shared Security Data&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/04/from-ips-to-ttps/&quot;&gt;From IPs to TTPs&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/06/20/security-essentials-basics-fundamentals-bare-minimum/&quot;&gt;Security Essentials? Basics? Fundamentals? Bare Minimum?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot;&gt;Monthly Blog Round-Up – May 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=okp1NSEwL5s:6-_f-e7Dius:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=okp1NSEwL5s:6-_f-e7Dius:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=okp1NSEwL5s:6-_f-e7Dius:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/okp1NSEwL5s&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4067814249880247106</guid>
         <pubDate>Tue, 01 Jul 2014 15:15:56 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – May 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/wKdG0IENO7g/monthly-blog-round-up-may-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;this&lt;/a&gt; for a more current list. &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&lt;/li&gt; &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log review processes and procedures (OK for PCI DSS 3.0 as well), whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on SIEM:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/&quot;&gt;Popular SIEM Starter Use Cases&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;Detailed SIEM Use Case Example&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/02/back-to-siem-research/&quot;&gt;Back to SIEM Research!&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/14/siem-webinar-questions-answered/&quot;&gt;SIEM Webinar Questions – Answered&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Previous research on threat intelligence (TI):&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/15/my-threat-intelligence-and-threat-assessment-research-papers-publish/&quot;&gt;My Threat Intelligence and Threat Assessment Research Papers Publish&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/16/threat-assessment-a-tough-subject-and-sharks-with-fricking-lasers/&quot;&gt;Threat Assessment – A Tough Subject (And Sharks with Fricking Lasers!)&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/31/on-threat-intelligence-management-platforms/&quot;&gt;On Threat Intelligence Management Platforms&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/20/on-internally-sourced-threat-intelligence/&quot;&gt;On Internally-sourced Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/14/delving-into-threat-actor-profiles/&quot;&gt;Delving into Threat Actor Profiles&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/26/on-threat-intelligence-sources/&quot;&gt;On Threat Intelligence Sources&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/19/how-to-make-better-threat-intelligence-out-of-threat-intelligence-data/&quot;&gt;How to Make Better Threat Intelligence Out of Threat Intelligence Data?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/04/on-threat-intelligence-use-cases/&quot;&gt;On Threat Intelligence Use Cases&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/30/on-broad-types-of-threat-intelligence/&quot;&gt;On Broad Types of Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/&quot;&gt;Threat Intelligence is NOT Signatures!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/15/the-conundrum-of-two-intelligences/&quot;&gt;The Conundrum of Two Intelligences!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/07/on-comparing-threat-intelligence-feeds/&quot;&gt;On Comparing Threat Intelligence Feeds&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/03/22/consumption-of-shared-security-data/&quot;&gt;Consumption of Shared Security Data&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/04/from-ips-to-ttps/&quot;&gt;From IPs to TTPs&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/05/09/on-defenders-advantage/&quot;&gt;On “Defender’s Advantage”&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/28/security-andorvsnot-compliance/&quot;&gt;Security And/Or/Vs/Not Compliance?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/05/monthly-blog-round-up-april-2014.html&quot;&gt;Monthly Blog Round-Up – April 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=wKdG0IENO7g:xz_rAbscKh8:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=wKdG0IENO7g:xz_rAbscKh8:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=wKdG0IENO7g:xz_rAbscKh8:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/wKdG0IENO7g&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-6957231348016342534</guid>
         <pubDate>Mon, 02 Jun 2014 16:45:17 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – April 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/AmJRo1N6N_I/monthly-blog-round-up-april-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarriorconsulting.com/pdfs/chuvakin_RSA_2010_SEIMBC_WP_0810.pdf&quot;&gt;the paper link&lt;/a&gt; is now working again, BTW – also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html&quot;&gt;“SANS Top 6 Log Reports Reborn!”&lt;/a&gt; is a new post that announces that many people’ work on best log reports has finally &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.edu/research/security-laboratory/article/sixtoplogcategories&quot;&gt;been published&lt;/a&gt; as “&lt;strong&gt;The 6 Categories of Critical Log Information&lt;/strong&gt;” (with a subtitle of “&lt;strong&gt;Top 6 SANS Essential Categories of Log Reports 2013&lt;/strong&gt;”) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on threat intelligence (TI):&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/16/threat-assessment-a-tough-subject-and-sharks-with-fricking-lasers/&quot;&gt;Threat Assessment – A Tough Subject (And Sharks with Fricking Lasers!)&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/31/on-threat-intelligence-management-platforms/&quot;&gt;On Threat Intelligence Management Platforms&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/20/on-internally-sourced-threat-intelligence/&quot;&gt;On Internally-sourced Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/14/delving-into-threat-actor-profiles/&quot;&gt;Delving into Threat Actor Profiles&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/26/on-threat-intelligence-sources/&quot;&gt;On Threat Intelligence Sources&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/19/how-to-make-better-threat-intelligence-out-of-threat-intelligence-data/&quot;&gt;How to Make Better Threat Intelligence Out of Threat Intelligence Data?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/04/on-threat-intelligence-use-cases/&quot;&gt;On Threat Intelligence Use Cases&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/30/on-broad-types-of-threat-intelligence/&quot;&gt;On Broad Types of Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/&quot;&gt;Threat Intelligence is NOT Signatures!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/15/the-conundrum-of-two-intelligences/&quot;&gt;The Conundrum of Two Intelligences!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/07/on-comparing-threat-intelligence-feeds/&quot;&gt;On Comparing Threat Intelligence Feeds&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/03/22/consumption-of-shared-security-data/&quot;&gt;Consumption of Shared Security Data&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/04/from-ips-to-ttps/&quot;&gt;From IPs to TTPs&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Miscellaneous fun posts&lt;/strong&gt;:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/28/security-andorvsnot-compliance/&quot;&gt;Security And/Or/Vs/Not Compliance?&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/14/siem-webinar-questions-answered/&quot;&gt;SIEM Webinar Questions – Answered&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/04/10/if-your-use-window-xp-your-are-not-pci-dss-compliant/&quot;&gt;If You Use Window XP – You Are NOT PCI DSS Compliant!&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/04/monthly-blog-round-up-march-2014.html&quot;&gt;Monthly Blog Round-Up – March 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=AmJRo1N6N_I:SYj_LH0eiqw:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=AmJRo1N6N_I:SYj_LH0eiqw:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=AmJRo1N6N_I:SYj_LH0eiqw:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/AmJRo1N6N_I&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-3632287372214001126</guid>
         <pubDate>Thu, 01 May 2014 14:55:25 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – March 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/VopRmETIKvo/monthly-blog-round-up-march-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;monthly &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarriorconsulting.com/pdfs/chuvakin_RSA_2010_SEIMBC_WP_0810.pdf&quot;&gt;the paper link&lt;/a&gt; is now working again, BTW – also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/02/logging-log-management-and-log-review.html&quot;&gt;“Logging, Log Management and Log Review Maturity”&lt;/a&gt; post describes a common curve for &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt;/log management maturation, from mere collection (“dead log storage”) to real-time monitoring and analysis [BTW, if I were to create this now, I’d have added a layer or two on top of this…] &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html&quot;&gt;“SANS Top 6 Log Reports Reborn!”&lt;/a&gt; is a new post that announces that many people’ work on best log reports has finally &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.edu/research/security-laboratory/article/sixtoplogcategories&quot;&gt;been published&lt;/a&gt; as “&lt;strong&gt;The 6 Categories of Critical Log Information&lt;/strong&gt;” (with a subtitle of “&lt;strong&gt;Top 6 SANS Essential Categories of Log Reports 2013&lt;/strong&gt;”) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;(why 6 of the “Top 5 entries” again? Well, the #6 on the list is a good read, that’s why!)&lt;/p&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on threat intelligence (TI):&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/26/how-to-use-threat-intelligence-with-your-siem/&quot;&gt;How to Use Threat Intelligence with Your SIEM?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/20/on-internally-sourced-threat-intelligence/&quot;&gt;On Internally-sourced Threat Intelligence&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/14/delving-into-threat-actor-profiles/&quot;&gt;Delving into Threat Actor Profiles&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/26/on-threat-intelligence-sources/&quot;&gt;On Threat Intelligence Sources&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/19/how-to-make-better-threat-intelligence-out-of-threat-intelligence-data/&quot;&gt;How to Make Better Threat Intelligence Out of Threat Intelligence Data?&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/04/on-threat-intelligence-use-cases/&quot;&gt;On Threat Intelligence Use Cases&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/30/on-broad-types-of-threat-intelligence/&quot;&gt;On Broad Types of Threat Intelligence&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/&quot;&gt;Threat Intelligence is NOT Signatures!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/15/the-conundrum-of-two-intelligences/&quot;&gt;The Conundrum of Two Intelligences!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/07/on-comparing-threat-intelligence-feeds/&quot;&gt;On Comparing Threat Intelligence Feeds&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/03/22/consumption-of-shared-security-data/&quot;&gt;Consumption of Shared Security Data&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/04/from-ips-to-ttps/&quot;&gt;From IPs to TTPs&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/03/monthly-blog-round-up-february-2014.html&quot;&gt;Monthly Blog Round-Up – February 2014&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=VopRmETIKvo:E3TVddv-ctw:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=VopRmETIKvo:E3TVddv-ctw:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=VopRmETIKvo:E3TVddv-ctw:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/VopRmETIKvo&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-1374385509837362748</guid>
         <pubDate>Tue, 01 Apr 2014 14:07:00 +0000</pubDate>
      </item>
      <item>
         <title>Amrit Williams:   RSA Announces End of RSA Security Conference</title>
         <link>https://techbuddha.wordpress.com/2014/03/31/rsa-to-end-rsa-security-conference-and-establish-industries-largest-cloud-security-conference/</link>
         <description>Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today announced their intentions to end the popular RSA security conference and establish a new cloud-security, cloud-only conference. RSA plans to leverage the increasing popularity and VC spending on cloud-security [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1761&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1761</guid>
         <pubDate>Mon, 31 Mar 2014 23:29:37 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <category>Security</category>
      </item>
      <item>
         <title>by Our Team Is Hiring Again: Join Gartner GTP Now!</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/QJ0x-3wdBCU/our-team-is-hiring-again-join-gartner.html</link>
         <description>&lt;p&gt;It is with great pleasure that I am announcing that our team is HIRING AGAIN! &lt;/p&gt; &lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://careers.gartner.com/OA_HTML/OA.jsp?OAFunc=IRC_VIS_VAC_DISPLAY&amp;amp;p_svid=26388&amp;amp;p_spid=2741071&quot;&gt;Join&lt;/a&gt; Security and Risk Management Strategies (SRMS) team at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/technology/research/technical-professionals.jsp&quot;&gt;Gartner for Technical Professionals (GTP)&lt;/a&gt;!&lt;/p&gt; &lt;p&gt;Excerpts from the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://careers.gartner.com/OA_HTML/OA.jsp?OAFunc=IRC_VIS_VAC_DISPLAY&amp;amp;p_svid=26388&amp;amp;p_spid=2741071&quot;&gt;job description&lt;/a&gt;: &lt;br&gt;&lt;img src=&quot;https://careers.gartner.com/OA_HTML/cabo/images/swan/t.gif&quot; width=&quot;5&quot;&gt;&lt;/p&gt; &lt;ul&gt; &lt;ul&gt; &lt;li&gt;&lt;strong&gt;Create and maintain high quality, accurate, and in depth documents&lt;/strong&gt; or architecture positions in information security, application security, infrastructure security, and/or related coverage areas;  &lt;li&gt;&lt;strong&gt;Prepare for and respond to customer questions&lt;/strong&gt; (inquiries/dialogues) during scheduled one hour sessions with accurate information and actionable advice, subject to capacity and demand;  &lt;li&gt;&lt;strong&gt;Prepare and deliver analysis in the form of presentation(s)&lt;/strong&gt; delivered at one or more of the company’s Catalyst conferences, Summit, Symposium, webinars, or other industry speaking events;  &lt;li&gt;Participate in industry conferences and vendor briefings, as required to gather research and maintain a high level of knowledge and expertise;  &lt;li&gt;Perform limited analyst consulting subject to availability and management approval;  &lt;li&gt;Support business development for GTP by participating in sales support calls/visits subject to availability and management approval;  &lt;li&gt;Contribute to research planning and development by participating in planning meetings, contributing to peer reviews, and research community meetings &lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt; &lt;p&gt;In essence, your job would be to research, write, guide clients (via phone inquiries/dialogs) and speak at events. Also, we do list a lot of qualifications in the job req, but you can look at my informal take on them in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/17/on-being-an-analyst-or-who-are-we-hiring/&quot;&gt;this post&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;So &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://careers.gartner.com/OA_HTML/OA.jsp?OAFunc=IRC_VIS_VAC_DISPLAY&amp;amp;p_svid=26388&amp;amp;p_spid=2741071&quot;&gt;APPLY HERE!&lt;/a&gt;&lt;/p&gt; &lt;p&gt;P.S. If the link above fails, go to &lt;a rel=&quot;nofollow&quot; title=&quot;https://careers.gartner.com&quot; target=&quot;_blank&quot; href=&quot;https://careers.gartner.com&quot;&gt;https://careers.gartner.com&lt;/a&gt; and search for “&lt;strong&gt;IRC26388&lt;/strong&gt;”&lt;/p&gt; &lt;p&gt;P.P.S. If you have questions, feel free to email me – I cannot promise a prompt response, but I sure can promise &lt;em&gt;a response.&lt;/em&gt;&lt;/p&gt; &lt;p&gt;P.P.P.S This is cross-posted from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/03/18/our-team-is-hiring-again-join-gartner-gtp-now/&quot;&gt;my Gartner blog&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Related posts:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/17/on-being-an-analyst-or-who-are-we-hiring/&quot;&gt;On Being An Analyst or WHO Are We Hiring?&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/02/our-team-is-hiring-again-australia-only/&quot;&gt;Our Team Is Hiring Again: Australia Only&lt;/a&gt; [position filled]  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/03/25/our-team-is-hiring-again-ukeurope-only/&quot;&gt;Our Team Is Hiring Again: UK/Europe Only&lt;/a&gt; [position filled]  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2012/06/20/our-team-is-hiring/&quot;&gt;Our Team Is Hiring&lt;/a&gt; [position filled] &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;The Last Blog Post!&lt;/a&gt; (when I joined Gartner in 2011)&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=QJ0x-3wdBCU:tw5SosAAJYc:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=QJ0x-3wdBCU:tw5SosAAJYc:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=QJ0x-3wdBCU:tw5SosAAJYc:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/QJ0x-3wdBCU&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-6479713150847855029</guid>
         <pubDate>Wed, 19 Mar 2014 12:05:00 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – February 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/vsh8b2BjLNY/monthly-blog-round-up-february-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;monthly &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.blogger.com/chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge. &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarriorconsulting.com/pdfs/chuvakin_RSA_2010_SEIMBC_WP_0810.pdf&quot;&gt;the paper link&lt;/a&gt; is now restored!) – also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth. &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html&quot;&gt;“SANS Top 6 Log Reports Reborn!”&lt;/a&gt; is a new post that announces that many people’ work on best log reports has finally &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.edu/research/security-laboratory/article/sixtoplogcategories&quot;&gt;been published&lt;/a&gt; as “&lt;strong&gt;The 6 Categories of Critical Log Information&lt;/strong&gt;” (with a subtitle of “&lt;strong&gt;Top 6 SANS Essential Categories of Log Reports 2013&lt;/strong&gt;”) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on threat intelligence:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/26/on-threat-intelligence-sources/&quot;&gt;On Threat Intelligence Sources&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/19/how-to-make-better-threat-intelligence-out-of-threat-intelligence-data/&quot;&gt;How to Make Better Threat Intelligence Out of Threat Intelligence Data?&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/02/04/on-threat-intelligence-use-cases/&quot;&gt;On Threat Intelligence Use Cases&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/30/on-broad-types-of-threat-intelligence/&quot;&gt;On Broad Types of Threat Intelligence&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/&quot;&gt;Threat Intelligence is NOT Signatures!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/15/the-conundrum-of-two-intelligences/&quot;&gt;The Conundrum of Two Intelligences!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/07/on-comparing-threat-intelligence-feeds/&quot;&gt;On Comparing Threat Intelligence Feeds&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/02/starting-threat-intelligence-research/&quot;&gt;Starting Threat Intelligence Research&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Past research on using big data approaches for security:&lt;/strong&gt;&lt;/p&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/21/our-security-information-and-event-management-futures-and-big-data-analytics-for-security-paper-publishes/&quot;&gt;Our “Security Information and Event Management Futures and Big Data Analytics for Security” Paper Publishes&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/11/18/big-data-analytics-mindset-what-is-it/&quot;&gt;Big Data Analytics Mindset – What Is It?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/12/11/big-data-for-security-realities-case-4-big-but-narrowly-used-data/&quot;&gt;Big Data for Security Realities – Case 4: Big But Narrowly Used Data&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/11/06/big-data-for-security-realities-case-3-elastic-search-or-similar/&quot;&gt;Big Data for Security Realities – Case 3: Elastic Search or Similar&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/17/big-data-for-security-realities-case-2-variety-explosion/&quot;&gt;Big Data for Security Realities – Case 2 Variety Explosion&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/10/big-data-for-security-realities-case-1-too-much-volume-to-store-aka-big-data-collection/&quot;&gt;Big Data for Security Realities - Case 1 Too Much Volume To Store aka “Big Data Collection”&lt;/a&gt;&lt;/div&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/23/more-on-big-data-security-analytics-readiness/&quot;&gt;More On Big Data Security Analytics Readiness&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/18/broadening-big-data-definition-leads-to-security-idiotics/&quot;&gt;Broadening Big Data Definition Leads to Security Idiotics!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/12/next-research-project-from-big-data-analytics-to-patching/&quot;&gt;Next Research Project: From Big Data Analytics to … Patching&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/15/9-reasons-why-building-a-big-data-security-analytics-tool-is-like-building-a-flying-car/&quot;&gt;9 Reasons Why Building A Big Data Security Analytics Tool Is Like Building a Flying Car&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2012/03/26/big-analytics-for-security-a-harbinger-or-an-outlier/&quot;&gt;“Big Analytics” for Security: A Harbinger or An Outlier?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/div&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/02/monthly-blog-round-up-january-2014.html&quot;&gt;Monthly Blog Round-Up – January 2014&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=vsh8b2BjLNY:ey3V0fS3VaM:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=vsh8b2BjLNY:ey3V0fS3VaM:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=vsh8b2BjLNY:ey3V0fS3VaM:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/vsh8b2BjLNY&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4365925955514234729</guid>
         <pubDate>Mon, 03 Mar 2014 16:05:02 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – January 2014</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/lkgJbtqOQQM/monthly-blog-round-up-january-2014.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;monthly &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.blogger.com/chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html&quot;&gt;“SANS Top 6 Log Reports Reborn!”&lt;/a&gt; is a new post that announces that many people’ work on best log reports has finally &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.edu/research/security-laboratory/article/sixtoplogcategories&quot;&gt;been published&lt;/a&gt; as “&lt;strong&gt;The 6 Categories of Critical Log Information&lt;/strong&gt;” (with a subtitle of “&lt;strong&gt;Top 6 SANS Essential Categories of Log Reports 2013&lt;/strong&gt;”) &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on threat intelligence:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/30/on-broad-types-of-threat-intelligence/&quot;&gt;On Broad Types of Threat Intelligence&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/&quot;&gt;Threat Intelligence is NOT Signatures!&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/15/the-conundrum-of-two-intelligences/&quot;&gt;The Conundrum of Two Intelligences!&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/07/on-comparing-threat-intelligence-feeds/&quot;&gt;On Comparing Threat Intelligence Feeds&lt;/a&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/02/starting-threat-intelligence-research/&quot;&gt;Starting Threat Intelligence Research&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Past research on using big data approaches for security:&lt;/strong&gt;&lt;/p&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2014/01/21/our-security-information-and-event-management-futures-and-big-data-analytics-for-security-paper-publishes/&quot;&gt;Our “Security Information and Event Management Futures and Big Data Analytics for Security” Paper Publishes&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/11/18/big-data-analytics-mindset-what-is-it/&quot;&gt;Big Data Analytics Mindset – What Is It?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/12/11/big-data-for-security-realities-case-4-big-but-narrowly-used-data/&quot;&gt;Big Data for Security Realities – Case 4: Big But Narrowly Used Data&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/11/06/big-data-for-security-realities-case-3-elastic-search-or-similar/&quot;&gt;Big Data for Security Realities – Case 3: Elastic Search or Similar&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/17/big-data-for-security-realities-case-2-variety-explosion/&quot;&gt;Big Data for Security Realities – Case 2 Variety Explosion&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/10/big-data-for-security-realities-case-1-too-much-volume-to-store-aka-big-data-collection/&quot;&gt;Big Data for Security Realities - Case 1 Too Much Volume To Store aka “Big Data Collection”&lt;/a&gt;&lt;/div&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/23/more-on-big-data-security-analytics-readiness/&quot;&gt;More On Big Data Security Analytics Readiness&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/18/broadening-big-data-definition-leads-to-security-idiotics/&quot;&gt;Broadening Big Data Definition Leads to Security Idiotics!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/12/next-research-project-from-big-data-analytics-to-patching/&quot;&gt;Next Research Project: From Big Data Analytics to … Patching&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/15/9-reasons-why-building-a-big-data-security-analytics-tool-is-like-building-a-flying-car/&quot;&gt;9 Reasons Why Building A Big Data Security Analytics Tool Is Like Building a Flying Car&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2012/03/26/big-analytics-for-security-a-harbinger-or-an-outlier/&quot;&gt;“Big Analytics” for Security: A Harbinger or An Outlier?&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/div&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2014/01/annual-blog-round-up-2013.html&quot;&gt;2013&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: most content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/monthly-blog-round-up-november-2013.html&quot;&gt;Monthly Blog Round-Up – November 2013&lt;/a&gt; &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=lkgJbtqOQQM:wYMxF7mPWqA:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=lkgJbtqOQQM:wYMxF7mPWqA:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=lkgJbtqOQQM:wYMxF7mPWqA:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/lkgJbtqOQQM&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4991746782864217883</guid>
         <pubDate>Sat, 01 Feb 2014 19:11:00 +0000</pubDate>
      </item>
      <item>
         <title>by Annual Blog Round-Up – 2013</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/COhF5-K9R-Q/annual-blog-round-up-2013.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my &lt;strong&gt;annual &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 10 popular posts/topics in 2013. &lt;br&gt;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” was again the most popular this year. The checklist, a list of critical things to look for while reviewing&amp;nbsp; system, network and security logs when responding to a security incident (companion &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;free log tool list&lt;/a&gt;) &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.&lt;/li&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review&lt;/a&gt; series of posts takes the #3 spot; they are about planning and executing a complete log review process at an organization. &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” is an &lt;em&gt;EXAMPLE&lt;/em&gt; requirement list for choosing a SIEM tool (it can be used for creating your very own SIEM RFP, but &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/1063212&quot;&gt;this&lt;/a&gt; is much better for it, of course).  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports (the paper link is now restored!) – also see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/&quot;&gt;this&lt;/a&gt; SIEM use case in depth.&lt;/li&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/04/on-choosing-siem.html&quot;&gt;On Choosing SIEM&lt;/a&gt;” is about &lt;em&gt;the least wrong way&lt;/em&gt; of choosing a SIEM tool – as well as about why the right way is so unpopular.  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/11/siem-bloggables.html&quot;&gt;“SIEM Bloggables”&lt;/a&gt; has one possible view on higher-level SIEM use cases and basic functionality, and a quick discussion of SIEM user types (circa 2009 – so NO “big data” for you!). &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/siem-resourcing-or-how-much-friggin.html&quot;&gt;“SIEM Resourcing or How Much the Friggin’ Thing Would REALLY Cost Me?”&lt;/a&gt; is a quick framework for assessing the SIEM project (well, a program, really) costs at an organization (much more details on this &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/document/2295616&quot;&gt;here&lt;/a&gt;). &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/05/my-best-pci-dss-presentation-ever.html&quot;&gt;“My Best PCI DSS Presentation EVER!”&lt;/a&gt; is my conference presentation where I make a passionate claim that PCI DSS is actually useful for security (do read &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.pcicompliancebook.info&quot;&gt;the PCI book&lt;/a&gt; as well)! &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/12/sans-top-6-log-reports-reborn.html&quot;&gt;SANS Top 6 Log Reports Reborn!&lt;/a&gt; highlights the re-release of top most popular log reports list.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: all this content was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;. &lt;/p&gt; &lt;p&gt;&lt;br&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;.&lt;/p&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=COhF5-K9R-Q:dmgDgpICGa0:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=COhF5-K9R-Q:dmgDgpICGa0:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=COhF5-K9R-Q:dmgDgpICGa0:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/COhF5-K9R-Q&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-8640988226901928024</guid>
         <pubDate>Wed, 01 Jan 2014 09:11:00 +0000</pubDate>
      </item>
      <item>
         <title>by SANS Top 6 Log Reports Reborn!</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/oWrbyQch85E/sans-top-6-log-reports-reborn.html</link>
         <description>&lt;p&gt;This story goes back years - many, many years. It starts with &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.org/security-resources/top5-logreports.pdf&quot;&gt;“SANS Top 5 Log Reports” [PDF]&lt;/a&gt; in 2006, and then continues with me volunteering to update it in 2009. I did &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html&quot;&gt;a lot of work&lt;/a&gt; on it in 2009-2010, but never got it to a stage where I was 100% happy with it.&amp;nbsp; Then in 2011, I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; and therefore was unable to finish it. Only in 2012 I found a new author who polished it before handing it to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.edu/&quot;&gt;SANS&lt;/a&gt; for publication.&lt;/p&gt; &lt;p&gt;The document has now &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.edu/research/security-laboratory/article/sixtoplogcategories&quot;&gt;been published&lt;/a&gt; as “&lt;strong&gt;The 6 Categories of Critical Log Information&lt;/strong&gt;” (with a subtitle of “&lt;strong&gt;Top 6 SANS Essential Categories of Log Reports 2013&lt;/strong&gt;”, v 3.01)&lt;/p&gt; &lt;p&gt;At its center are these top log report categories:  &lt;ol&gt; &lt;li&gt;&lt;b&gt;Authentication and Authorization Reports&lt;/b&gt;  &lt;li&gt;&lt;b&gt;Systems and Data Change Reports&lt;/b&gt;  &lt;li&gt;&lt;b&gt;Network Activity Reports&lt;/b&gt;  &lt;li&gt;&lt;b&gt;Resource Access Reports&lt;/b&gt;  &lt;li&gt;&lt;b&gt;Malware Activity Reports&lt;/b&gt;  &lt;li&gt;&lt;b&gt;Failure and Critical Error Reports&lt;/b&gt;&lt;/li&gt;&lt;/ol&gt; &lt;p&gt;The document can be used to figure out what to log, what to report on and what reports to review for various purposes. &lt;p&gt;So, enjoy! &lt;strong&gt;A lot&lt;/strong&gt; of work of many smart people went into this. Thanks A LOT to those who contributed to it over the years. Special thanks go to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://ranum.com/security/computer_security/index.html&quot;&gt;Marcus Ranum&lt;/a&gt;, the original logging guru, and the enlightened members of the SANS GIAC Alumni mailing list. &lt;p&gt;P.S. Those of you who have read &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt; have seen an earlier and somewhat more wordy version of it. This one is better!&lt;/p&gt; &lt;h5&gt;&lt;strong&gt;Related posts and the entire history of this effort:&lt;/strong&gt;&lt;/h5&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.sans.org/security-resources/top5-logreports.pdf&quot;&gt;Legacy SANS Top 5 Log Reports [PDF]&lt;/a&gt; (2006) &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/07/sans-top-5-essential-log-reports-update.html&quot;&gt;SANS Top 5 Essential Log Reports Update!&lt;/a&gt; (2010)  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/updated-with-community-feedback-sans_06.html&quot;&gt;Updated With Community Feedback SANS Top 7 Essential Log Reports DRAFT2&lt;/a&gt; (2010)&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=oWrbyQch85E:in06brAexdI:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=oWrbyQch85E:in06brAexdI:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=oWrbyQch85E:in06brAexdI:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/oWrbyQch85E&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-4927925583410204343</guid>
         <pubDate>Mon, 09 Dec 2013 13:55:00 +0000</pubDate>
      </item>
      <item>
         <title>by Monthly Blog Round-Up – November 2013</title>
         <link>http://feedproxy.google.com/~r/AntonChuvakinPersonalBlog/~3/Ktcf4wZiP8I/monthly-blog-round-up-november-2013.html</link>
         <description>&lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;Here is my next &lt;strong&gt;monthly &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.blogger.com/chuvakin.blogspot.com/&quot;&gt;&quot;Security Warrior&quot; blog&lt;/a&gt; &lt;/strong&gt;round-up of top 5 popular posts/topics this month:&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt; &lt;ol&gt; &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/06/why-no-open-source-siem-ever.html&quot;&gt;Why No Open Source SIEM, EVER?&lt;/a&gt;” contains some of my &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/tag/SIEM/&quot;&gt;SIEM&lt;/a&gt; thinking from 2009. Is it relevant now? Well, you be the judge.  &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html&quot;&gt;Simple Log Review Checklist Released!&lt;/a&gt;” is often at the top of this list – the checklist is still a very useful tool for many people. “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/09/on-free-log-management-tools.html&quot;&gt;On Free Log Management Tools&lt;/a&gt;” is a companion to the checklist (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/03/updated-free-log-management-tools.html&quot;&gt;updated version&lt;/a&gt;)  &lt;li&gt;My classic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/07/chuvakin.blogspot.com/search/label/PCI_Log_Review&quot;&gt;PCI DSS Log Review series&lt;/a&gt; is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log review processes and procedures, whether regulatory or not. It is also described in more detail in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/Logging-Log-Management-Authoritative-Understanding/dp/1597496359&quot;&gt;our Log Management book&lt;/a&gt;. &lt;li&gt;“&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/top-10-criteria-for-siem.html&quot;&gt;Top 10 Criteria for a SIEM?&lt;/a&gt;” came from one of my last projects I did when running my SIEM consulting firm in 2009-2011. &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/08/new-siem-whitepaper-on-use-cases-in.html&quot;&gt;“New SIEM Whitepaper on Use Cases In-Depth OUT!”&lt;/a&gt; (dated 2010) presents a whitepaper on select SIEM use cases in depth (the paper link is now &lt;strong&gt;RESTORED&lt;/strong&gt;!) &lt;/li&gt;&lt;/ol&gt;&lt;/div&gt; &lt;p&gt;In addition, I’d like to draw your attention to a few recent posts from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;my Gartner blog&lt;/a&gt;: &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Current research on using big data approaches for security:&lt;/strong&gt;&lt;/p&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/11/18/big-data-analytics-mindset-what-is-it/&quot;&gt;Big Data Analytics Mindset – What Is It?&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/11/06/big-data-for-security-realities-case-3-elastic-search-or-similar/&quot;&gt;Big Data for Security Realities – Case 3: Elastic Search or Similar&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/17/big-data-for-security-realities-case-2-variety-explosion/&quot;&gt;Big Data for Security Realities – Case 2 Variety Explosion&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/10/big-data-for-security-realities-case-1-too-much-volume-to-store-aka-big-data-collection/&quot;&gt;Big Data for Security Realities - Case 1 Too Much Volume To Store aka “Big Data Collection”&lt;/a&gt;&lt;/div&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/23/more-on-big-data-security-analytics-readiness/&quot;&gt;More On Big Data Security Analytics Readiness&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/18/broadening-big-data-definition-leads-to-security-idiotics/&quot;&gt;Broadening Big Data Definition Leads to Security Idiotics!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/12/next-research-project-from-big-data-analytics-to-patching/&quot;&gt;Next Research Project: From Big Data Analytics to … Patching&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/04/15/9-reasons-why-building-a-big-data-security-analytics-tool-is-like-building-a-flying-car/&quot;&gt;9 Reasons Why Building A Big Data Security Analytics Tool Is Like Building a Flying Car&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2012/03/26/big-analytics-for-security-a-harbinger-or-an-outlier/&quot;&gt;“Big Analytics” for Security: A Harbinger or An Outlier?&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/big-data/&quot;&gt;big data&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;Current research on security patch management:&lt;/strong&gt;&lt;/div&gt; &lt;ul dir=&quot;ltr&quot;&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/28/cannot-patch-compensate-mitigate-terminate/&quot;&gt;Cannot Patch? Compensate, Mitigate, Terminate!&lt;/a&gt;&lt;/div&gt; &lt;li&gt; &lt;div style=&quot;text-align:left;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/10/09/what-is-your-minimum-time-to-patch-or-patch-sound-barrier/&quot;&gt;What is Your Minimum Time To Patch or “Patch Sound Barrier”&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/05/06/patch-management-not-a-solved-problem/&quot;&gt;Patch Management – NOT A Solved Problem!&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2013/09/12/next-research-project-from-big-data-analytics-to-patching/&quot;&gt;Next Research Project: From Big Data Analytics to … Patching&lt;/a&gt;  &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/2012/08/29/on-nebulous-security-policies/&quot;&gt;On Nebulous Security Policies&lt;/a&gt;  &lt;li&gt;All posts related to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin/category/patching/&quot;&gt;patching&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&amp;nbsp;&lt;/div&gt; &lt;div style=&quot;text-align:left;&quot; dir=&quot;ltr&quot;&gt;(see my published Gartner research &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;here&lt;/a&gt;)&lt;/div&gt; &lt;p&gt;Also see my past &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Annual&quot;&gt;annual&lt;/a&gt; “Top Popular Blog Posts” – &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2008/01/annual-blog-round-up-2007.html&quot;&gt;2007&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2009/01/annual-blog-round-up-2008.html&quot;&gt;2008&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2009.html&quot;&gt;2009&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2010/01/annual-blog-round-up-2010.html&quot;&gt;2010&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2012/01/annual-blog-round-up-2011.html&quot;&gt;2011&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/01/annual-blog-round-up-2012.html&quot;&gt;2012&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;: all content at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securitywarrior.org/&quot;&gt;SecurityWarrior blog&lt;/a&gt; was written before I &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2011/07/last-blog-post.html&quot;&gt;joined Gartner&lt;/a&gt; on Aug 1, 2011 and is solely my personal view &lt;strong&gt;&lt;u&gt;&lt;em&gt;at the time of writing&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;. For my current security blogging, go &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blogs.gartner.com/anton-chuvakin&quot;&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Previous post in this endless series:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/2013/11/monthly-blog-round-up-october-2013.html&quot;&gt;Monthly Blog Round-Up – October 2013&lt;/a&gt;  &lt;li&gt;All posts tagged &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://chuvakin.blogspot.com/search/label/Monthly&quot;&gt;monthly&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;div class=&quot;blogger-post-footer&quot;&gt;About me: http://www.chuvakin.org&lt;/div&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=Ktcf4wZiP8I:iDHly4QvaFc:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=Ktcf4wZiP8I:iDHly4QvaFc:63t7Ie-LG7Y&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=63t7Ie-LG7Y&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?a=Ktcf4wZiP8I:iDHly4QvaFc:7Q72WNTAKBA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/AntonChuvakinPersonalBlog?d=7Q72WNTAKBA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/AntonChuvakinPersonalBlog/~4/Ktcf4wZiP8I&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>anton@chuvakin.org (Anton Chuvakin)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-19553129.post-2136758943337811475</guid>
         <pubDate>Mon, 02 Dec 2013 15:49:54 +0000</pubDate>
      </item>
      <item>
         <title>Amrit Williams:   Red Dawn: Unit 61398 – Now What?</title>
         <link>https://techbuddha.wordpress.com/2013/02/21/red-dawn-unit-61398-now-what/</link>
         <description>Some of my &amp;#8216;so-called&amp;#8217; friends that help organize the RSA Security Bloggers event have decided that folks that attend should actually have blogged something recently, well I haven&amp;#8217;t so to make them happy&amp;#8230; With the increasing frequency and severity of advanced threats perpetrated by highly-organized and sophisticated groups and nation-states, enterprises need to realize that [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1751&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1751</guid>
         <pubDate>Thu, 21 Feb 2013 19:32:11 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <media:content medium="image" url="https://techbuddha.files.wordpress.com/2013/02/pudong.jpg">
            <media:title type="html">chinesehackers</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   20 Years in Infosec; Time to Party like its *1999</title>
         <link>https://techbuddha.wordpress.com/2012/02/29/20-years-in-infosec-time-to-party-like-its-1999/</link>
         <description>I am not a big fan of AT&amp;#38;T (here), but this video from AT&amp;#38;T released in 1990 is about the most insightful view into modern day infosec I&amp;#8217;ve ever seen (here) and since it was produced pre-brick walls on fire and simple clouds to depict complex relationships it is more believable than most security marketing [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1743&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1743</guid>
         <pubDate>Wed, 29 Feb 2012 08:48:51 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   Searching for Privacy in a World Without Secrets</title>
         <link>https://techbuddha.wordpress.com/2011/12/09/searching-for-privacy-in-a-world-without-secrets/</link>
         <description>&amp;#8220;I am not a number, I am a free man&amp;#8221; IDC reported that we generated and replicated 1.8 zettabytes &amp;#8211; that&amp;#8217;s 1.8 trillion gigabytes &amp;#8211; of data in 2011. To give you an example of scale you would need to stack CDs from Earth to the Moon and Back again &amp;#8211; twice &amp;#8211; to represent [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1729&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1729</guid>
         <pubDate>Fri, 09 Dec 2011 05:51:36 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <media:content medium="image" url="https://techbuddha.files.wordpress.com/2011/12/sheeple.jpg">
            <media:title type="html">sheeple</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   Class-action Lawsuit Against HP for Not Disclosing Security Vulnerabilities Has Huge Implications</title>
         <link>https://techbuddha.wordpress.com/2011/12/08/class-action-lawsuit-against-hp-for-not-disclosing-security-vulnerabilities-has-huge-implications/</link>
         <description>On December 1, 2011 a Class-action lawsuit was filed in United States District Court Northern District of California against Hewlett-Packard, alleging violations of The California Consumer Legal Remedies Act for Injunctive Relief and the California Unfair Competition Law based on non-disclosure of a known security vulnerability (read the filing here) Nature of the Action l. [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1723&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1723</guid>
         <pubDate>Thu, 08 Dec 2011 09:58:53 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   One Warm Coat…Two Changed Lives</title>
         <link>https://techbuddha.wordpress.com/2011/11/03/one-warm-coat-two-changed-lives/</link>
         <description>&amp;#60;Warning: This post has nothing to do with technology, information security, or anything else I normally blog about&amp;#62; This post is dedicated to the memory of Stephanie Renee Fong When I was in my early 20s I met a young women named Stephanie, we quickly grew very close. Stephanie was special to me in many [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1714&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1714</guid>
         <pubDate>Thu, 03 Nov 2011 19:13:00 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   Incomplete Thought: Are You Really Data-Driven or Just Using Data To Prove a Point?</title>
         <link>https://techbuddha.wordpress.com/2011/09/21/incomplete-thought-are-you-really-data-driven-or-just-using-data-to-prove-a-point/</link>
         <description>I love data, I love the benefits that data analysis offers, and I love the concept of large amounts of data being massaged, queried, and providing insights through a whole new set of technical innovations &amp;#8211; and there are many in data right now. In fact I believe that this year has probably been the [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1707&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1707</guid>
         <pubDate>Wed, 21 Sep 2011 18:10:09 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <media:content medium="image" url="https://techbuddha.files.wordpress.com/2011/09/datadriven.png">
            <media:title type="html">datadriven</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   Top 10 Most Overhyped Technology Terms</title>
         <link>https://techbuddha.wordpress.com/2011/09/21/top-10-most-overhyped-technology-terms/</link>
         <description>We have entered a new era of information technology, an era where the clouds are moist, the data is obese and incontinent, and the threats are advanced, persistent, and the biggest ever. Of course with all the paradigm-shifting, next generation, FUD vs. ROI marketing, its important to remember that sometimes we need to balance innovation [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1696&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1696</guid>
         <pubDate>Wed, 21 Sep 2011 00:14:41 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <media:content medium="image" url="https://techbuddha.files.wordpress.com/2011/09/hyperbole1.png">
            <media:title type="html">hyperbole</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   Why I Suck at Blogging…and Twitter</title>
         <link>https://techbuddha.wordpress.com/2011/09/10/why-i-suck-at-blogging-and-twitter/</link>
         <description>So recently I posted some thoughts on big data and the increasing usage of Hadoop, the general theme was data management != data analysis&amp;#8230;this caused confusion with some folks, as evidenced by the twitter exchange (tweets haven&amp;#8217;t been altered but some extraneous &amp;#8216;noise&amp;#8217; removed to maximize your reading pleasure) @Beaker @amrittsering I&amp;#8217;m confused by your last blog. [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1688&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1688</guid>
         <pubDate>Sat, 10 Sep 2011 06:59:30 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <media:content medium="image" url="https://techbuddha.files.wordpress.com/2011/09/failure.jpg">
            <media:title type="html">failure</media:title>
         </media:content>
      </item>
      <item>
         <title>Amrit Williams:   Needles in a Digital Hay Stack; Finding Value in Big Data</title>
         <link>https://techbuddha.wordpress.com/2011/09/10/needles-in-a-digital-hay-stack-finding-value-in-big-data/</link>
         <description>Big data is a scorching hot topic, currently capturing a lions share of the markets available stock of hyperbole and for good reason, data is growing at a meteoric rate. As we continue to innovate, as business accelerates technology adoption, as the line bleeds between corporate and personal computing and as we interact more in digital mediums [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://pixel.wp.com/b.gif?host=techbuddha.wordpress.com&amp;#038;blog=346549&amp;#038;post=1676&amp;#038;subd=techbuddha&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://techbuddha.wordpress.com/?p=1676</guid>
         <pubDate>Sat, 10 Sep 2011 01:43:50 +0000</pubDate>
         <media:content medium="image" url="https://2.gravatar.com/avatar/eeb4632680aa1e326a0f74c0d6015cc9?s=96&amp;amp;d=identicon&amp;amp;r=G">
            <media:title type="html">amritw</media:title>
         </media:content>
         <media:content medium="image" url="https://techbuddha.files.wordpress.com/2011/09/bigdata4.png">
            <media:title type="html">bigdata</media:title>
         </media:content>
      </item>
   </channel>
</rss>
<!-- fe1.yql.bf1.yahoo.com compressed/chunked Mon Sep 28 21:48:33 UTC 2015 -->
