Anton Chuvakin

http://twitter.com/anton_chuvakin

Information Security, Logging, Intrusion Detection, Forensics

Areas of Expertise:

  • Information Security
  • Logging
  • Log Management
  • Intrusion Detection
  • Computer Forensics
  • Honeypots and Honeynet
  • Security Data Analysis
  • speaking
  • training
  • writing

Dr. Anton Chuvakin, Ph.D., GCIH, GCFA is a recognized security expert and book author. His current role is PCI Solutions Director at Qualys. His past roles included Chief Logging Evangelist with LogLogic, a log management company, and a Chief Security Strategist with another security company.

He is an author of a book "Security Warrior" and a contributor to "Know Your Enemy II", "Information Security Management Handbook", "Hacker's Challenge 3" and "PCI Compliance" books. In his spare time he maintains his security portal http://www.info-secure.org and several blogs, including one on O'Reilly and his personal blog at SecurityWarrior.org.

He also participates in various security industry initiatives and standards organizations.

Security Warrior Security Warrior
by Cyrus Peikari , Anton Chuvakin
January 2004
Print: $44.95
Ebook: $35.99

Recent Posts | All O'Reilly Posts

Anton blogs at:

Log Management Tool Selection Checklist Out

November 05 2010

Knowing how much people love IT-security related checklists, here is one more: a checklist for comparing log management tools. It is being released at the new log management related site, Log Management Central (subscribe to RSS, follow on Twitter). The announcement... read more

Fun Project Honeynet Log Challenge: Log Mysteries

September 01 2010

Project Honeynet just released its latest Forensic Challenge 5 - Log Mysteries. It is based on logs from a compromised virtual server and requires quite a bit of digging through messy log data. read more

Most Useful Reports Based On Log Data?

July 14 2010

Help define the most useful reports from log data read more

Simple Log Review Checklist Released!

March 09 2010

The log cheat sheet presents a checklist for reviewing critical system, network and security logs when responding to a security incident. It can also be used for routine periodic log review. It was authored by Dr. Anton Chuvakin and Lenny Zeltser read more

Top Log FAIL

October 29 2009

A recent Wal-Mart intrusion story inspired me to summarize the most egregious, reckless, painful, negligent, sad, idiotic examples of failures with logs and logging - "Top Log FAIL." I am pretty sure that esteemed readers of SysAdmin Blog would never,... read more

Review of "Beautiful Security" Book

June 22 2009

"Beautiful Security" from O'Reilly, which I just finished reading, is truly an awesome book. Now, I will probably have a high opinion of my own chapter ("Beautiful Log Handling") since it took some work (eh... and one near-complete rewrite) to... read more

Recent Posts | All O'Reilly Posts

Webcast: The Top Five Log Analysis Mistakes
May 27, 2008
In this live webcast, security expert Anton Chuvakin will cover operational security challenges that organizations face while deploying log and alert collection and analysis infrastructure. The talk will center around the common mistakes organizations...

Anton Chuvakin