By This Author
Detection Déjà Vu: a tale of two incident response engagements Detection Déjà Vu: a tale of two incident response engagements
December 4, 2019
Stories from the field 10 Hackers Hacking: A Holiday Countdown of Retail Cybersecurity Threats 10 Hackers Hacking: A Holiday Countdown of Retail Cybersecurity Threats
November 26, 2019
MITRE ATT&CK Debriefing ATT&CKcon 2.0: Five great talks at MITRE’s ATT&CK conference Debriefing ATT&CKcon 2.0: Five great talks at MITRE’s ATT&CK conference
November 6, 2019
Security operations Using visibility to gather context and find persistence mechanisms Using visibility to gather context and find persistence mechanisms
October 9, 2019
Threat detection It’s all fun and games until ransomware deletes the shadow copies It’s all fun and games until ransomware deletes the shadow copies
August 21, 2019
Threat detection Black Hat: Detecting the unknown and disclosing a new attack technique Black Hat: Detecting the unknown and disclosing a new attack technique
August 8, 2019
Detection and response From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling
June 19, 2019
Security operations Meet Todd Gaiser: detection engineering extraordinaire Meet Todd Gaiser: detection engineering extraordinaire
May 8, 2019
Security operations