By This Author
Part 1: How to use MITRE ATT&CK to mature your threat hunting program
Webinars| Threat hunting
Part 1: How to use MITRE ATT&CK to mature your threat hunting program Building a Winning Security Team: Practical Tips on Training and Team Development Building a Winning Security Team: Practical Tips on Training and Team Development
March 26, 2018
Security operations Why the Philosophy of Continuous Monitoring Is Powerful Why the Philosophy of Continuous Monitoring Is Powerful
August 29, 2017
Opinions & insights Common Security Mistake #3: Aimless Use of Threat Intelligence Common Security Mistake #3: Aimless Use of Threat Intelligence
August 10, 2017
Opinions & insights Common Security Mistake #2: Focusing on the Perimeter Common Security Mistake #2: Focusing on the Perimeter
July 26, 2017
Opinions & insights You Will Be Phished. Three Ways to Mitigate Your Phishing Risk. You Will Be Phished. Three Ways to Mitigate Your Phishing Risk.
July 11, 2017
Opinions & insights Common Security Mistake #1: Lack of Visibility Common Security Mistake #1: Lack of Visibility
June 13, 2017
Opinions & insights What to Do When Threat Prevention Fails (Hint: It Always Does) What to Do When Threat Prevention Fails (Hint: It Always Does)
May 17, 2017
Opinions & insights