Skip Navigation
Get a Demo
 
Principal Security Researcher

Brian Donohue

Brian has been writing and speaking about information security for more than a decade. He started his career as a journalist covering security and privacy for Threatpost. He later worked as a cyber threat intelligence analyst, leading the production of multiple strategic, tactical, and operational intelligence products for commercial clients at Booz Allen Hamilton. At Red Canary, Brian creates technical and educational content for the information security community, and helps guide the company's educational and research programs.
Meet Todd Gaiser: detection engineering extraordinaire
Meet Todd Gaiser: detection engineering extraordinaire
Adversaries use scripting more than any ATT&CK technique except PowerShell
Adversaries use scripting more than any ATT&CK technique except PowerShell
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
Threat analysis: Regsvr32 is the third most popular ATT&CK technique
Connection Proxy Ranks Fourth Among ATT&CK Techniques
Connection Proxy Ranks Fourth Among ATT&CK Techniques
Spearphishing Ranks Fifth Among ATT&CK Techniques
Spearphishing Ranks Fifth Among ATT&CK Techniques
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
Previewing RSA Conference: 10 Talks to Attend
Previewing RSA Conference: 10 Talks to Attend
Stopping Emotet Before it Moves Laterally
Stopping Emotet Before it Moves Laterally

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top