Technical Content Manager

Brian Donohue

Brian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst, researching adversaries and techniques for a variety of major banks, retailers, and manufacturers. At Red Canary, Brian helps guide research production efforts and technical messaging.
 
Meet Todd Gaiser: detection engineering extraordinaire
 
Adversaries use scripting more than any ATT&CK technique except PowerShell
 
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
 
Connection Proxy Ranks Fourth Among ATT&CK Techniques
 
Spearphishing Ranks Fifth Among ATT&CK Techniques
 
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
 
2019 Threat Detection Report
 
Previewing RSA Conference: 10 Talks to Attend