Technical Content Manager

Brian Donohue

Brian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst, researching adversaries and techniques for a variety of major banks, retailers, and manufacturers. At Red Canary, Brian helps guide research production efforts and technical messaging.
 
From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling
 
Meet Todd Gaiser: detection engineering extraordinaire
 
Adversaries use scripting more than any ATT&CK technique except PowerShell
 
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
 
Connection Proxy Ranks Fourth Among ATT&CK Techniques
 
Spearphishing Ranks Fifth Among ATT&CK Techniques
 
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
 
2019 Threat Detection Report