By This Author
Stealers evolve to bypass Google Chrome’s new app-bound encryption Stealers evolve to bypass Google Chrome’s new app-bound encryption
November 13, 2024
Threat intelligence The CrowdStrike outage: Detection and defense in depth The CrowdStrike outage: Detection and defense in depth
September 12, 2024
Security operations Coming to a city near you, it’s Red Canary Live! Coming to a city near you, it’s Red Canary Live!
March 25, 2024
Security operations Strengthen your Core with NIST’s updated cybersecurity framework Strengthen your Core with NIST’s updated cybersecurity framework
February 28, 2024
Security operations Unpacking CVSS 4.0 and understanding vulnerability risk Unpacking CVSS 4.0 and understanding vulnerability risk
November 15, 2023
Security operations How AI will affect the malware ecosystem and what it means for defenders How AI will affect the malware ecosystem and what it means for defenders
August 28, 2023
Opinions & insights Live from New York, it’s Threat Detection Series Live! Live from New York, it’s Threat Detection Series Live!
March 29, 2023
Threat detection Atomic Habits, atomic tests Atomic Habits, atomic tests
February 8, 2023
Testing and validation