Technical Content Manager

Brian Donohue

Brian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst, researching adversaries and techniques for a variety of major banks, retailers, and manufacturers. At Red Canary, Brian helps guide research production efforts and technical messaging.
Meet Todd Gaiser: detection engineering extraordinaire
Adversaries use scripting more than any ATT&CK technique except PowerShell
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
Connection Proxy Ranks Fourth Among ATT&CK Techniques
Spearphishing Ranks Fifth Among ATT&CK Techniques
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
2019 Threat Detection Report
Previewing RSA Conference: 10 Talks to Attend