By Unknown Lamer from Slashdot's victory-in-secret-court-still-considered-failure department
msm1267 writes "Google, Yahoo and Facebook filed amended requests today with the U.S. Foreign Intelligence Surveillance Court reiterating their desire to publish numbers on requests for user data related to national security. Google, meanwhile, went a step further asking for an open, public hearing with the court so that the issue could be publicly debated."
Statements from Yahoo's general counsel
[PDF]) and Facebook's general counsel
[PDF]). According to Facebook, "In recent weeks, it has become clear that the dialogue with the U.S. government that produced some additional transparency at the outset is at this point unlikely to result in more progress. As a result, today we are joining others in the industry in petitioning the Foreign Intelligence Surveillance Court to require the government to permit companies to disclose more information about the volume and types of national security-related orders they receive."Read Replies (0)
By samzenpus from Slashdot's read-all-about-it department
benrothke writes "It has been about 8 years since my friend Richard Bejtlich's (note, that was a full disclosure 'my friend') last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable book, you are already reviewing tcpdump output at page 16. In The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Bejtlich takes the approach that your network will be attacked and breached. He observes that a critical part of your security posture must be that of network security monitoring (NSM), which is the collection and analysis of data to help you detect and respond to intrusions."
Read below for the rest of Ben's review. The Practice of Network Security Monitoring: Understanding Incident Detection and Response
author Richard Bejtlich
publisher No Starch Press
reviewer Ben Rothke
summary Definitive guide to the new world of Network Security Monitoring (NSM)Read Replies (0)