By This Author
Defying tunneling: A Wicked approach to detecting malicious network traffic Defying tunneling: A Wicked approach to detecting malicious network traffic
February 12, 2025
Threat detection Explore the new Atomic Red Team website Explore the new Atomic Red Team website
November 13, 2024
Testing and validation Better know a data source: Network telemetry Better know a data source: Network telemetry
November 7, 2023
MITRE ATT&CK Ransomware survival guide: A holistic approach to detection and mitigation Ransomware survival guide: A holistic approach to detection and mitigation
August 26, 2020
Threat detection Everything you need to engage a virtual audience Everything you need to engage a virtual audience
July 8, 2020
Opinions & insights Endpoint Security vs Network Security: Where to Invest Your Budget Endpoint Security vs Network Security: Where to Invest Your Budget
September 11, 2019
Opinions & insights Building security from the ground up as a team of one Building security from the ground up as a team of one
July 25, 2019
Opinions & insights MITRE ATT&CK Deep Dive: Persistence
Webinars| MITRE ATT&CK
MITRE ATT&CK Deep Dive: Persistence