Technical Content Manager

Brian Donohue

Brian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst, researching adversaries and techniques for a variety of major banks, retailers, and manufacturers. At Red Canary, Brian helps guide research production efforts and technical messaging.
From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling
Meet Todd Gaiser: detection engineering extraordinaire
Adversaries use scripting more than any ATT&CK technique except PowerShell
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
Connection Proxy Ranks Fourth Among ATT&CK Techniques
Spearphishing Ranks Fifth Among ATT&CK Techniques
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
2019 Threat Detection Report