Recently by Anton Chuvakin

Knowing how much people love IT-security related checklists, here is one more: a checklist for comparing log management tools. It is being released at the new log management related site, Log Management Central (subscribe to RSS, follow on Twitter). The announcement...
Project Honeynet just released its latest Forensic Challenge 5 - Log Mysteries. It is based on logs from a compromised virtual server and requires quite a bit of digging through messy log data.
Help define the most useful reports from log data.
The log cheat sheet presents a checklist for reviewing critical system, network and security logs when responding to a security incident. It can also be used for routine periodic log review. It was authored by Dr. Anton Chuvakin and Lenny Zeltser
A recent Wal-Mart intrusion story inspired me to summarize the most egregious, reckless, painful, negligent, sad, idiotic examples of failures with logs and logging - "Top Log FAIL." I am pretty sure that esteemed readers of SysAdmin Blog would never, ever do anything of that sort.
Beautiful Security from O'Reilly, which I just finished reading, is truly an awesome book. Now, I will probably have a high opinion of my own chapter ("Beautiful Log Handling") since it took some work (eh... and one near-complete rewrite) to...

News Topics

Recommended for You

Got a Question?