Skip Navigation
Get a Demo
 
Principal Information Security Specialist

Brian Donohue

Brian has been writing and speaking about information security for the last decade. He started his career as a journalist covering security and privacy for Threatpost. He later worked as a cyber threat intelligence analyst, leading the production of multiple strategic, tactical, and operational intelligence products for commercial clients at Booz Allen Hamilton. At Red Canary, Brian creates technical and educational content for the information security community, and helps guide the company's educational and research programs.
Black Hat: Detecting the unknown and disclosing a new attack technique
Black Hat: Detecting the unknown and disclosing a new attack technique
From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling
From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling
Meet Todd Gaiser: detection engineering extraordinaire
Meet Todd Gaiser: detection engineering extraordinaire
Adversaries use scripting more than any ATT&CK technique except PowerShell
Adversaries use scripting more than any ATT&CK technique except PowerShell
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
Connection Proxy Ranks Fourth Among ATT&CK Techniques
Connection Proxy Ranks Fourth Among ATT&CK Techniques
Spearphishing Ranks Fifth Among ATT&CK Techniques
Spearphishing Ranks Fifth Among ATT&CK Techniques
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
 
 
Back to Top