Posts

Showing posts from April, 2009

Review of Crimeware Posted

Image
Amazon.com just posted my four star review of Crimeware by Markus Jakobsson and Zulfikar Ramzan. Really, I'm not kidding. After a four month hiatus I'm posting book reviews. From the review : Crimeware is a collection of chapters collectively written by 40-odd security researchers. Sometimes this approach is a formula for disaster, but here the end result is a solid book that covers a broad number of topics. Because each author or group of authors know their field well, they can delve fairly deeply when necessary, and their material is technically accurate. However, some of the chapters are boring and lifeless. This book blocked my reading queue for about 4 months, which is a sign I found the text unappealing. It took a flight from Amsterdam to convince me to finish it! Still, I agree with many of the other reviewers -- Crimeware is an impressive examination of malware, on a variety of fronts. Richard Bejtlich is teaching new classes in Las Vegas in 2009. Early Las Ve

Traffic Talk 5 Posted

Image
My fifth edition of Traffic Talk , titled Network security monitoring using transaction data , has been posted. From the article: Welcome back to Traffic Talk, a regular SearchNetworkingChannel.com series for network solution providers and consultants who troubleshoot business networks. We took a break, but we're back with more articles on using network traffic to make your business more productive and secure. In this article, I discuss network security monitoring (NSM) and introduce one specific form of NSM data -- transaction data. If you have any questions on the article, please post them here. I should be writing new Traffic Talk articles every other month. Snort Report seems to be on hold for the time being, but if that changes I will post word here. If you'd like to see the Snort Report return to SearchSecurityChannel.com, post a comment here. Thank you. Richard Bejtlich is teaching new classes in Las Vegas in 2009. Early Las Vegas registration ends 1 May.

TaoSecurity Blog Wins Best Non-Technical Blog at RSA

Image
I noticed in Martin McKay's post Security Bloggers Meetup 2009 that TaoSecurity Blog (this blog, despite where you might be reading the reposted content) won the Best Non-Technical Blog award at the RSA 2009 Security Bloggers Meetup . Thank you for the votes! I was not aware that the blog was nominated nor did I mention the contest here. I appreciate the votes despite the posting slow-down while I was vacationing with my family and then teaching in Amsterdam. I have several posts planned for this weekend or soon thereafter! Richard Bejtlich is teaching new classes in Las Vegas in 2009. Early Las Vegas registration ends 1 May.

4th Issue of BSD Magazine

Image
I recently received a copy of the 4th issue of BSD Magazine . The cover focus is on PC-BSD , but there are also articles on ZFS, Django, and backups. This magazine seems to really be coming along. I would be interested to know if people are seeing it at their local book stores. A new issue of Linux+ Magazine is also posted too. Richard Bejtlich is teaching new classes in Las Vegas in 2009. Early Las Vegas registration ends 1 May.

Elvis Presents IDS vs NSM

Image
When I teach Network Security Monitoring I often introduce the alternative using an image like the following. It shows what an analyst (here, Elvis) might do if the only data he had to work with as an alert from something like a traditional intrusion detection system. Compare that workflow with the possibilities provided by Network Security Monitoring: Usually when I present this concept I take the opportunity to mention that Elvis studied American Kenpo with the founder of the style, Ed Parker. I also mention that Elvis frequently performed karate on stage, even doing so at someone else's concert! I decided to track down a reference for that particular story, and through Shane Peterson's Elvis and the Martial Arts found this: Elvis attended the Tom Jones show on September 3rd [1974], during the show he was introduced to the crowd by Tom, at that moment he was invited on stage and Tom asked him if he'd like to sing something, it wasn't possible he said as h

Speaking of Incident Response

Image
In my last post I mentioned I will be speaking at another SANS IR event this summer. I just noticed a post on the ISC site titled Incident Response vs. Incident Handling . It states: Incident Response is all of the technical components required in order to analyze and contain an incident. Incident Handling is the logistics, communications, coordination, and planning functions needed in order to resolve an incident in a calm and efficient manner. That's not right, and never was. I tried pointing that out via a comment on the ISC post, but apparently the moderators aren't willing to accept contradictory comments. Incident response and incident handling are synonyms. If you need to differentiate between the role that does technical work and one which does leadership work, you can use incident response/handling for the former and incident management for the latter. Ten years ago I took a course at CERT called Advanced Computer Security Incident Handling for Technical

Bejtlich to Keynote at SANS Forensics and Incident Response 2009

Image
I am pleased to announce that I will return to SANS in 2009 to provide another keynote at the second SANS WhatWorks Summit in Forensics and Incident Response . I published Thoughts on 2008 SANS Forensics and IR Summit last year. Rob Lee did a great job organizing the 2008 event and I expect the 2009 event to be excellent as well. This 2-day summit will be held at The Fairmont in Washington, D.C. on 6-7 July. Richard Bejtlich is teaching new classes in Las Vegas in 2009. Early Las Vegas registration ends 1 May.