By This Author
 Unmasking risks that haunt your supply chain Unmasking risks that haunt your supply chain
 October 30, 2025
  Security operations  Redefining incident response in the age of AI Redefining incident response in the age of AI
 September 26, 2025
  Incident response  A defender’s guide to identity attacks A defender’s guide to identity attacks
 December 16, 2024
  Threat detection  From the dreamhouse to the SOC: Ken’s guide to security From the dreamhouse to the SOC: Ken’s guide to security
 November 12, 2024
  Threat detection  Apple picking: Bobbing for Atomic Stealer & other macOS malware Apple picking: Bobbing for Atomic Stealer & other macOS malware
 October 10, 2024
  Threat detection  Scarlet Goldfinch: Taking flight with NetSupport Manager Scarlet Goldfinch: Taking flight with NetSupport Manager
 June 26, 2024
  Threat intelligence  The rise of Charcoal Stork The rise of Charcoal Stork
 March 18, 2024
  Threat intelligence  What Home Alone teaches us about proactive defense What Home Alone teaches us about proactive defense
 December 19, 2023
  Incident response