A Walk Down Adversary Lane - XP sp1

October 18, 2019

Python, IronPython, C#/.Net "OH MY" **SILENTTRINITY**

February 23, 2019

Measuring your Defenses for Reals...

October 28, 2018

The Evolving Threat - IoT Botnets

October 3, 2018

Memory Forensics – Process Analysis Part 1 of 2

March 19, 2018

1/4
Please reload

Please reload

Follow "THIS JUST IN"

November 1, 2017

In light of all the cyberattacks that have been well publicized as of late, we see the increasing need for skilled IT security resources to both protect against and respond to rapidly evolving cyber-threats. IT professionals tasked with protecting their companies’ cybe...

October 31, 2017

Lately there has been some articles and conversations around the security profession, particularly the ‘how to get started’ aspect. My good friend, Aamir Lakhani wrote a great article on getting started in cyber security (http://www.drchaos.com/getting-started-with-a-c...

October 30, 2017

What happens when you purchase used hard drives and try data recovery? Listen to Aamir "Dr. Chaos" Lakhani's talk at AUSCert 2016.

October 28, 2017

What is Big Data Security Analytics?

Big Data is the collection of data sets that are large and complex. The vast size, diversity, and complexity of the data, makes it difficult to process using traditional applications.

Traditional databases are great at processing simi...

October 26, 2017

Original article found at: https://www.csoonline.com/article/3203804/security/know-your-enemy-understanding-threat-actors.html

Sun Tzu wrote in his famous book, The Art of War, “If you know the enemy and know yourself, you need not fear the result of a hundred battles....

October 18, 2017

The original article can be found at https://www.csoonline.com/article/3201972/security/are-you-aware-of-your-cyber-situation.html

As human beings, we are constantly looking for information to help improve situations. If we live or work in a crowded city, for example, w...

Please reload

Recommended Reading
Search By Tags
Who's Behind The Blog

illumin808 is a blog dedicated to Cyber Counter Intelligence and Cybersecurity technologies. The posts will be a discussion of concepts and technologies that make up emerging threats and techniques related to Cyber Defense. Sometimes we get a little off-topic. Articles are gathered or written by cyber security professionals, leading OEMs, and enthusiasts from all over the world to bring an in-depth, real-world, look at Cyber Security.

 

 

About this blog illumin808 and any affiliate website does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed, purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein. Everything on this blog is based on personal opinion and should be interoperated as such. Contact Info If you would like to contact this blog, you may do so by emailing tony@illumin808.com

© illumin808