By This Author
Call to Arms: 4 Things Everyone in InfoSec Should Stop Doing Right Now Call to Arms: 4 Things Everyone in InfoSec Should Stop Doing Right Now
February 14, 2018
Opinions & insights “semaG dna nuF” with Right-to-Left Override Unicode Characters “semaG dna nuF” with Right-to-Left Override Unicode Characters
September 13, 2017
Threat detection Threat Hunting for Dridex Attacks: Top Questions from Security Teams Threat Hunting for Dridex Attacks: Top Questions from Security Teams
July 20, 2017
Opinions & insights Five Guidelines for Measuring and Reporting on Your Security Operations Program Five Guidelines for Measuring and Reporting on Your Security Operations Program
June 26, 2017
Security operations There’s Gold in Those Endpoints: Threat Mining vs Threat Hunting There’s Gold in Those Endpoints: Threat Mining vs Threat Hunting
April 11, 2017
Detection and response Threat hunting is not a magical unicorn Threat hunting is not a magical unicorn
March 21, 2017
Opinions & insights Break through the noise: take control of your incident response program
Webinars| Security operations
Break through the noise: take control of your incident response program How to Get an Information Security Analyst Job: Interview Questions, Answers & Advice (Part Two) How to Get an Information Security Analyst Job: Interview Questions, Answers & Advice (Part Two)
February 14, 2017
Opinions & insights