By This Author
Adversaries compromise email accounts at educational institutions in back-to-school campaign Adversaries compromise email accounts at educational institutions in back-to-school campaign
August 14, 2023
Threat intelligence 4 hiring tips for building a cyber threat intelligence team 4 hiring tips for building a cyber threat intelligence team
August 23, 2022
Threat intelligence So you’re thinking about starting a cyber threat intelligence team… So you’re thinking about starting a cyber threat intelligence team…
September 30, 2021
Threat intelligence Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm
March 9, 2021
Microsoft Remapping Red Canary with ATT&CK sub-techniques Remapping Red Canary with ATT&CK sub-techniques
October 1, 2020
Atomic Red Team Getting started in cyber threat intelligence: 4 pieces of advice Getting started in cyber threat intelligence: 4 pieces of advice
September 15, 2020
Opinions & insights Hello world: on finding my voice Hello world: on finding my voice
June 16, 2020
Opinions & insights Endpoint security: what’s changed and what hasn’t? Endpoint security: what’s changed and what hasn’t?
May 19, 2020
Opinions & insights