By This Author
 The art and science of effective security storytelling The art and science of effective security storytelling
 October 27, 2025
  Threat detection  Artificial authentication: Understanding and observing Azure OpenAI abuse Artificial authentication: Understanding and observing Azure OpenAI abuse
 October 30, 2024
  Threat detection  Safely validate executable file attributes with Atomic Test Harnesses Safely validate executable file attributes with Atomic Test Harnesses
 September 28, 2023
  MITRE ATT&CK  When MFA isn’t an option: The legacy of ROPC When MFA isn’t an option: The legacy of ROPC
 June 14, 2023
  Microsoft  Better know a data source: Antimalware Scan Interface Better know a data source: Antimalware Scan Interface
 January 12, 2022
  Threat detection  Better know a data source: Process command line Better know a data source: Process command line
 October 20, 2021
  Threat detection  Steering clear of bad drivers: How to apply Microsoft’s recommended driver block rules Steering clear of bad drivers: How to apply Microsoft’s recommended driver block rules
 September 2, 2021
  Threat detection  The adversary’s gift: When one technique opens a Pandora’s box The adversary’s gift: When one technique opens a Pandora’s box
 July 28, 2021
  Linux security