By This Author
Hijack My, Hijack My, Hijack My DLL Hijack My, Hijack My, Hijack My DLL
July 10, 2019
Detection and response VMware Carbon Black technology: a look forward, from the past VMware Carbon Black technology: a look forward, from the past
May 30, 2019
Product updates You and what army? How lean security teams defend against evolving threats
Webinars| Security operations
You and what army? How lean security teams defend against evolving threats Defense Evasion and Phishing Emails Defense Evasion and Phishing Emails
February 20, 2019
Threat detection Improving SecOps employee retention from day one
Webinars| Security operations
Improving SecOps employee retention from day one Attacking a Mac: Detecting MacOS Post-Exploitation Attacking a Mac: Detecting MacOS Post-Exploitation
October 3, 2018
Threat detection 4 Strategic Approaches to Retaining Security Operations Staff 4 Strategic Approaches to Retaining Security Operations Staff
August 29, 2018
Security operations Detecting Application Shimming: A Story About Continuous Improvement Detecting Application Shimming: A Story About Continuous Improvement
February 1, 2018
Threat detection