By This Author
Lost in the cloud: What Home Alone 2 teaches us about cloud security Lost in the cloud: What Home Alone 2 teaches us about cloud security
December 4, 2025
Security operations Sniffing out TruffleHog in AWS Sniffing out TruffleHog in AWS
November 13, 2025
Threat detection Unmasking risks that haunt your supply chain Unmasking risks that haunt your supply chain
October 30, 2025
Security operations Redefining incident response in the age of AI Redefining incident response in the age of AI
September 26, 2025
Incident response A defender’s guide to identity attacks A defender’s guide to identity attacks
December 16, 2024
Threat detection From the dreamhouse to the SOC: Ken’s guide to security From the dreamhouse to the SOC: Ken’s guide to security
November 12, 2024
Threat detection Apple picking: Bobbing for Atomic Stealer & other macOS malware Apple picking: Bobbing for Atomic Stealer & other macOS malware
October 10, 2024
Threat detection Scarlet Goldfinch: Taking flight with NetSupport Manager Scarlet Goldfinch: Taking flight with NetSupport Manager
June 26, 2024
Threat intelligence