digital forensics | incident response

Mind Mapping Volatility

 memory forensics, learning

Great sources of DFIR information are endless: books, blogs, repositories, Twitter, lectures, conferences, and journals. One of the hardest skills I am yet to master is transferring this huge amount

The Cuckoo's Egg: Redux

 theory, books

So many people recommend 'The Cuckoo's Egg' as a must-read for information security professionals. For those in the dark, the book follows the author Cliff Stoll tracking unauthorised access to