2017 was a big year for the Red Canary blog! We wrote dozens of articles and added a roster of outstanding contributors—ranging from security analysts, threat researchers, technical account managers, and incident responders to C-level security experts both inside and outside of Red Canary.
A few articles really caught the attention of the security community in 2017, so we wanted to highlight them again to wrap up the year. Enjoy!
Subscribe to the Red Canary blog to receive security best practices and threat information
How to Use Windows API Knowledge to Be a Better Defender
By Ben Downing, Security Analyst
The Windows API is a large, complex topic with decades of development history and design behind it. Although it is far too vast to cover in a single article, even a cursory knowledge is enough to improve event analysis and basic malware analysis skills. Understanding how Windows works can help defenders to better understand and defend against threats, know where attackers might be hiding, and identify improvements to limit attackers’ abilities.
This Windows technical deep dive provides an overview of what the Windows API is, how and why executables use the API, and how to apply that knowledge to improve defenses.
3 Practical Ways for Lean Security Teams to Boost Their Defenses
By Casey Smith, Director of Applied Research

This article walks through 3 practical steps to help prepare organizations to face modern threats with constrained resources.
Red Canary Introduces Atomic Red Team, a New Testing Framework for Defenders
By Casey Smith, Director of Applied Research, and Michael Haag, Director of Advanced Threat Detection & Research

This article walks through how to use the Atomic Red Team framework and includes a short “how-to” video.
How to Prevent Ransomware: 5 Practical Techniques and Countermeasures
By Michael Haag, Director of Advanced Threat Detection & Research

Whether you have dealt with ransomware or are preparing for it, this article provides helpful guidance by sharing practical techniques and technical controls that you can use to detect and prevent ransomware.
Threat Hunting Is Not a Magical Unicorn
By Joe Moles, Director of Detection Operations

Using Alternate Data Streams to Bypass User Account Controls
By Keshia LeVan, Security Analyst

Are You Using Tabletop Simulations to Improve Your Information Security Program?
By Kyle Rainey, Security Analyst

Looking Ahead to 2018: A Note From the Editor
As Red Canary grows, so does our roster of contributors. This is a truly unique quality. Our analysts, researchers, technical account managers, and security strategists have a variety of backgrounds and skillsets. They come from all parts of the country. But they share one common mission: make security better for organizations of all sizes.
Looking back at the articles we published this year reminded me of the quote: “The whole is greater than the sum of its parts.” Individually, our writers represent some of the industry’s best and brightest minds. Together, we are a team of experts with the potential to truly make security better.
The Red Canary blog will continue to bring security professionals new ideas, hands-on techniques, and educational resources for improving their security programs. Here’s to another year of great security—and great blogs!
Have an idea for a blog post? Want to join our team of contributors? We’re always on the lookout for new talent and ideas. Pitch your ideas to: marketing@redcanary.com.
