Profile

Cover photo
Anton Chuvakin
Works at Gartner
Attended SUNY Stony Brook
Lives in San Francisco, CA
3,258 followers|1,979,597 views
AboutPostsPhotosVideos+1'sReviews

Stream

Anton Chuvakin

Shared publicly  - 
 
"During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen® devices and to decrypt VPN connections. "   <- so surreal!
IMPORTANT JUNIPER SECURITY ANNOUNCEMENT POSTED BY BOB WORRALL, SVP CHIEF INFORMATION OFFICER ON DECEMBER 17, 2015 Juniper ...
5
1
Jeff Hall's profile photoBert Knabe's profile photo
 
This is NOT good! :(
Add a comment...

Anton Chuvakin

Discussion  - 
 
Another one: new sharing screen is somehow less nice than the old one. More clicks required now... why was it done? what is better about it?
6
Add a comment...

Anton Chuvakin

Discussion  - 
 
Ah, another one: some of the saved articles look like binary code :-) --- a bunch of unreadable symbols piled together. I do click 'report article', but maybe I need to send a screenshot.....
3
Anton Chuvakin's profile photojason flannagan's profile photo
2 comments
 
Me too. Binary code instead of the article s. Very frustrating. 
Add a comment...

Anton Chuvakin

Discussion  - 
 
Why isn't there a way to say:

A] I don't like THIS recommendation, and/or
B] do not show me recommendations LIKE THIS?

This would be useful to tune them faster and make them more relevant.... I am sure your engine learns from what we save, but why not add learning from what we don't want to see....

Frankly, many of the recoms are kinda off...way off.
1
Justin Rochell's profile photo
 
Hey Anton. Thanks for sharing your thoughts!

You can tell us that you don't like a recommendation by tapping the overflow menu on the recommended item and tapping Report. Here, you'll be able to tell us why you want to report it (not interesting, already seen, offensive, etc.). 

You can give us an opposite, positive signal for a recommendation by saving the item. Recommendations are largely inspired by what you save, and will improve as you save more content to Pocket. 

I hope his helps!
Add a comment...

Anton Chuvakin

Shared publicly  - 
 
"it’s interesting to see how many organizations achieve great results by putting together a few open source tools and custom scripts while others fail miserably with the latest #SIEM and #UEBA (#UBA) technology in their hands"  http://blogs.gartner.com/augusto-barros/2015/10/28/research-on-security-monitoring-use-cases-coming-up/
1
1
Bert Knabe's profile photo
Add a comment...

Anton Chuvakin

Shared publicly  - 
13
1
Paul Hosking's profile photo
Add a comment...

Anton Chuvakin

Shared publicly  - 
 
"The scientists" discover The Worst UI EVER! :-)
 
Imagine the worst debugging UI you've ever seen.  This is worse.

And yes, this is real... it's the debug panel for these things: https://www.ecoatm.com

#WTF   #UX  
47 comments on original post
6
Add a comment...
Have him in circles
3,258 people
Google+ Categorized Circles's profile photo
Apurba Ganguly's profile photo
David M's profile photo
Mongolian consulting research center MCRC's profile photo
Charalampos Doukas's profile photo
Joanne Udaze's profile photo
Michael Ahrendt's profile photo
Fernando Duran's profile photo
Martin Knight's profile photo

Anton Chuvakin

Shared publicly  - 
 
Monthly Blog Round-Up – December 2015
Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “ Why
No Open Source SIEM, EVER? ” contains some of my SIEM thinking from
2009. Is it relevant now? Well, you be the judge.  Current popularity of open sour...
2
1
Kim Halavakoski's profile photo
Add a comment...

Anton Chuvakin

Discussion  - 
 
Here is an example I promised to post:
9
E John Feig's profile photoMarkus Huggler (maege, magbeat)'s profile photoMax Weiner's profile photoTyler Ritchie's profile photo
5 comments
 
"Refresh" will show the content but that defeats the purpose of caching the data locally.
Add a comment...

Anton Chuvakin

Shared publicly  - 
 
"when the [#SIEM] use case implementation process includes the same level of change management formality (and bureaucracy) that IT operations, it’s time to simplify."  http://blogs.gartner.com/augusto-barros/2015/10/28/research-on-security-monitoring-use-cases-coming-up/
4
Add a comment...

Anton Chuvakin

Shared publicly  - 
 
That is our future - totally!
6
2
Matthew J. Harmon's profile photoSamuele Baisi's profile photo
Add a comment...
People
Have him in circles
3,258 people
Google+ Categorized Circles's profile photo
Apurba Ganguly's profile photo
David M's profile photo
Mongolian consulting research center MCRC's profile photo
Charalampos Doukas's profile photo
Joanne Udaze's profile photo
Michael Ahrendt's profile photo
Fernando Duran's profile photo
Martin Knight's profile photo
Work
Occupation
Research Vice President @ Gartner for Technical Professionals
Skills
Information security, strategy, security architecture, SIEM, PCI DSS, etc
Employment
  • Gartner
    Research Vice President, 2014 - present
    Anton Chuvakin is a Research VP at Gartner's GTP Security and Risk Management group. Previous Experience Before Mr. Chuvakin joined Gartner, his job responsibilities included security product management, evangelist, research, competitive analysis, PCI DSS compliance, and SIEM development and implementation. He is an author of the books "Security Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy II," "Information Security Management Handbook" and other books. He has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS and security management. His blog "Security Warrior" was one of the most popular in the industry. In addition, Mr. Chuvakin has taught classes and presented at many security conferences across the world; he recently addressed audiences in the U.S., the U.K., Singapore, Spain, Russia and other countries. He has worked on emerging security standards and served on advisory boards of several security startups.
  • Gartner
    Research Director, 2011 - 2014
    Anton Chuvakin is a Research Director in Gartner's GTP Security and Risk Management group. Previous Experience Before Mr. Chuvakin joined Gartner, his job responsibilities included security product management, evangelist, research, competitive analysis, PCI DSS compliance, and SIEM development and implementation. He is an author of the books "Security Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy II," "Information Security Management Handbook" and other books. He has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS and security management. His blog "Security Warrior" was one of the most popular in the industry. In addition, Mr. Chuvakin has taught classes and presented at many security conferences across the world; he recently addressed audiences in the U.S., the U.K., Singapore, Spain, Russia and other countries. He has worked on emerging security standards and served on advisory boards of several security startups.
  • Security Warrior Consulting
    Principal, 2009 - 2011
  • Ubizen
    Research Analyst, 2001 - 2002
  • netForensics
    Strategist, 2002 - 2006
  • LogLogic
    Chief Logging Evangelist, 2006 - 2008
  • Qualys
    Director of PCI Compliance Solutions, 2008 - 2009
  • SUNY Stony Brook
    1996 - 2001
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
San Francisco, CA
Previously
Russia - Moscow, Russia - Stony Brook, NY - Boston, MA - Edison, NJ - Sunnyvale, CA - Redwood Shores, CA
Story
Tagline
Information Security and Having Fun
Introduction

Dr. Anton Chuvakin is a Research VP at Gartner for Technical Professionals (GTP)  Security and Risk Management Strategies team.

He is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of books "Security Warrior", "PCI Compliance", "Logging and Log Management" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management, honeypots, etc . His blog securitywarrior.org was one of the most popular in the industry. 

In addition, Anton teaches classes (including his own SANS class on log management) and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He worked on emerging security standards and served on the advisory boards of several security start-ups.

Before joining Gartner in 2011, Anton was running his own security consulting practice www.securitywarriorconsulting.com, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.

Bragging rights
I write books (among other things)
Collections Anton is following
Education
  • SUNY Stony Brook
  • Moscow State University
  • State University of New York at Stony Brook
Basic Information
Gender
Male
Relationship
Married
Other names
Anton, Dr. Anton
Anton Chuvakin's +1's are the things they like, agree with, or want to recommend.
A $445B economic threat you aren't prepared for
www.cnbc.com

The hacking underworld is exploding as skilled well-funded criminals target US companies and consumers to steal whatever they can.

Bernie Supporters Asked to Define Socialism, Response Explains His Rise
www.thefederalistpapers.org

Socialists aren't very smart. Apparently neither are Democrats who support Bernie Sanders

meirwah/awesome-incident-response: A curate... - GitHub
github.com

awesome-incident-response - A curated list of tools for incident response

Real Strategists Don't Use Smartphones - Modern War Institute
www.modernwarinstitute.org

Major Matt Cavanaugh writes that military strategists should not cling to digital devices like smartphones in order to stay focused and more

At least try ;) - 9GAG
9gag.com

Click to see the pic and write a comment...

Norse Corp: Deconstructing threat intelligence on Iran | CSO Online
www.csoonline.com

Memo circulated to government officials contains no actual intelligence, redefines the word attack

Defending a network from the NSA | Computerworld
www.computerworld.com

The head of NSA TAO advises on defensive computing for networks

The half-life of divorce
tindertipsforgirls.blogspot.com

Today B asked me if I have "closure" from my divorce. The answer is "probably not" in the same way that Chernobyl is not exactly ready for t

How to determine if big data security analytics will produce useful outc...
www.networkworld.com

Five “sniff tests” to determine whether proposed big data security techniques really measure up

GitHub - hrbrmstr/pewpew: Build your own IP Attack Maps with SOUND!
github.com

pewpew - :star: :star: :star: Build your own IP Attack Maps with SOUND!

IPew Attack Map Creative Commons License About IPew Attack maps ...
ocularwarfare.com

About IPew. Attack maps are the tag of information security. They are pure eye candy, meant to scare the general public and WOW unsuspecting

Sorry, Donald Trump. But Megyn Kelly is a fantastic debate moderator. - ...
www.washingtonpost.com

She can be confrontational and charming all at once. And that's a perfect combination.

Imgur: The most awesome images on the Internet
imgur.com

Imgur: The most awesome images on the Internet.

Spying through strangers' webcams just got easier
www.cnbc.com

Spying on strangers through their webcams has never been easier. Shodan helps users access unsecured webcams and other connected devices.

Webinar on Security Monitoring Use Cases - Augusto Barros
blogs.gartner.com

As I mentioned (many times) before, our current research covers Security Monitoring Use Cases. We’ve been busy writing about that and the pa

EDR Research Commensing: Call To Action! - Anton Chuvakin
blogs.gartner.com

As we mentioned in this post, we are about the visit the land of EDR (formerly: ETDR) in order to update Gartner GTP EDR coverage and to cre

Affinity Gaming sues Trustwave over data breach
www.scmagazine.com

Affinity Gaming is suing Trustwave for at least a 100,000 for allegedly failing to adequately investigate and remedy a data breach.

“Internet of Things” security is hilariously broken and getting worse | ...
arstechnica.com

Shodan search engine is only the latest reminder of why we need to fix IoT security.

Bacon wrapped dates! Awesome beer!
Public - in the last week
reviewed in the last week
Great food!
Public - in the last week
reviewed in the last week
Excellent Mexican food, bowl and fajitas were to die for. Also great vibe and service!
Public - 2 weeks ago
reviewed 2 weeks ago
Public - a month ago
reviewed a month ago
251 reviews
Map
Map
Map
Excellent food and service! Duck and lamb we got were magical.
Public - 3 weeks ago
reviewed 3 weeks ago
Another mall, another hole-in-wall sushi place with GREAT food. Some of their rolls are a bit heavy - don't eat too many (but you'd want to!) :-) At this point, we have been here dozens of times and love it every time...
Food: ExcellentDecor: GoodService: Excellent
Public - a month ago
reviewed a month ago