By This Author
Driving Efficacy Through Detector Tuning: a Deeper Dive Into Detection Engineering Driving Efficacy Through Detector Tuning: a Deeper Dive Into Detection Engineering
May 16, 2018
Security operations Using Alternate Data Streams to Bypass User Account Controls Using Alternate Data Streams to Bypass User Account Controls
September 8, 2017
Threat detection Alert Fatigue: How to Tune Out the Noise and Reclaim Your Hours Alert Fatigue: How to Tune Out the Noise and Reclaim Your Hours
August 3, 2017
Security operations Old Phishing Attacks Deploy a New Methodology: Verclsid.exe Old Phishing Attacks Deploy a New Methodology: Verclsid.exe
April 6, 2017
Threat detection Whitelist Evasion Example: Threat Detection #723 Whitelist Evasion Example: Threat Detection #723
March 2, 2017
Threat detection Bypassing Application Whitelisting: How IT Teams Can Detect It Bypassing Application Whitelisting: How IT Teams Can Detect It
March 1, 2017
Threat detection