By This Author
ATT&CK Deep Dive: Defense Evasion
Webinars| MITRE ATT&CK
ATT&CK Deep Dive: Defense Evasion MITRE ATT&CK Deep Dive: Lateral Movement
Webinars| MITRE ATT&CK
MITRE ATT&CK Deep Dive: Lateral Movement Part 1: How to use MITRE ATT&CK to mature your threat hunting program
Webinars| Threat hunting
Part 1: How to use MITRE ATT&CK to mature your threat hunting program Building a Winning Security Team: Practical Tips on Training and Team Development Building a Winning Security Team: Practical Tips on Training and Team Development
March 26, 2018
Security operations Why the Philosophy of Continuous Monitoring Is Powerful Why the Philosophy of Continuous Monitoring Is Powerful
August 29, 2017
Opinions & insights Common Security Mistake #3: Aimless Use of Threat Intelligence Common Security Mistake #3: Aimless Use of Threat Intelligence
August 10, 2017
Opinions & insights Common Security Mistake #2: Focusing on the Perimeter Common Security Mistake #2: Focusing on the Perimeter
July 26, 2017
Opinions & insights You Will Be Phished. Three Ways to Mitigate Your Phishing Risk. You Will Be Phished. Three Ways to Mitigate Your Phishing Risk.
July 11, 2017
Opinions & insights