By This Author
Invoke-Atomic leaves the nest Invoke-Atomic leaves the nest
April 15, 2020
Testing and validation Upended Overnight: Facing Threats to Banking and Finance Webinar
Webinars| Stories from the field
Upended Overnight: Facing Threats to Banking and Finance Webinar Detection Déjà Vu: a tale of two incident response engagements Detection Déjà Vu: a tale of two incident response engagements
December 4, 2019
Stories from the field 10 Hackers Hacking: A Holiday Countdown of Retail Cybersecurity Threats 10 Hackers Hacking: A Holiday Countdown of Retail Cybersecurity Threats
November 26, 2019
MITRE ATT&CK Debriefing ATT&CKcon 2.0: Five great talks at MITRE’s ATT&CK conference Debriefing ATT&CKcon 2.0: Five great talks at MITRE’s ATT&CK conference
November 6, 2019
Security operations Using visibility to gather context and find persistence mechanisms Using visibility to gather context and find persistence mechanisms
October 9, 2019
Threat detection It’s all fun and games until ransomware deletes the shadow copies It’s all fun and games until ransomware deletes the shadow copies
August 21, 2019
Threat detection Black Hat: Detecting the unknown and disclosing a new attack technique Black Hat: Detecting the unknown and disclosing a new attack technique
August 8, 2019
Detection and response