Monthly Blog Round-Up – October 2017

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts based on lastmonth’s visitor data  (excluding other monthly or annual round-ups):“New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports ; also see this SIEM use case in depth and this for a more current list of popular SIEM use cases. Finally, see our 2016 research on developing security monitoring use cases here – and we are updating it now.“Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009 (oh, wow, ancient history!). Is it relevant now? You be the judge.  Succeeding with SIEM requires a lot of work, whether you paid for the software, or not. BTW, this post has an amazing “staying power” that is hard to explain – I suspect it has to do with people wanting “free stuff” and googling for “open source SIEM” …  “Simple Log Review Checklist Released!” is often at...
Read more
Page 1 of 612345...Last »