Security Event Analysis Through Correlation by Anton Chuvakin
Security Incident Log Review Checklist by Anton Chuvakin and Lenny Zeltser
Insider Attacks: The Doom of Information Security Methods to thwart insider attacks: products, techniques and policies
What do I really need to do to STAY compliant with PCI DSS?
Logging "BrainBox" Short Article by Dr. Anton Chuvakin
Old Paper on Rootkits
Top5 Log Analysis Mistakes - Second Edition by Dr. Anton Chuvakin
Trends in Database Log Management by Anton Chuvakin
Five IDS mistakes people make
Five Mistakes Security Policy by Anton Chuvakin
Honeypot Essentials by Anton Chuvakin
Log Analysis Across System Boundaries for Security, Compliance, and Operations by Dr. Anton Chuvakin
Five Mistakes of Incident Response by Anton Chuvakin
Days of the Honeynet: Attacks, Tools, Incidents by Anton Chuvakin
Audit logs for Security and Compliance by Anton Chuvakin
Importance Of Structured Incident Response Process
Data hiding and finding on Linux by Anton Chuvakin
Automated Incident Handling Using SIM by Dr. Anton Chuvakin
Take back your security infrastructure by Anton Chuvakin
Chroot Protection and Breaking by Anton Chuvakin