By This Author
Security Advice You Can Actually Use in 2017 Security Advice You Can Actually Use in 2017
December 12, 2016
Opinions & insights Top 6 Questions & Answers: How to Take Control of Your Response Operations Top 6 Questions & Answers: How to Take Control of Your Response Operations
December 1, 2016
Incident response Detecting Insider Threats: You Don’t Need a Silver Bullet Detecting Insider Threats: You Don’t Need a Silver Bullet
April 26, 2016
Threat detection Reflections on PowerShell Abuse: Webinar Recap Reflections on PowerShell Abuse: Webinar Recap
February 29, 2016
Threat detection They’re baaack: Using responder feedback to detect repeat infections They’re baaack: Using responder feedback to detect repeat infections
December 3, 2015
Threat detection Stolen signing certificate leads to banking trojan Stolen signing certificate leads to banking trojan
October 5, 2015
Threat detection Microsoft HTML Application (HTA) Abuse, Part Deux Microsoft HTML Application (HTA) Abuse, Part Deux
August 14, 2015
Threat detection Red Canary vs. PoshRAT: Detection in the Absence of Malware Red Canary vs. PoshRAT: Detection in the Absence of Malware
July 29, 2015
Threat detection