Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 

Red Canary Guest Contributors

Bringing together voices of the security community

Interested in writing a guest blog or participating in a webinar? Email us at blog@redcanary.com and share your ideas!

 
Michel de Crevoisier
Senior Security Analyst & Threat Detection lead
 
Terence Jackson
CHIEF INFORMATION SECURITY & PRIVACY OFFICER AT THYCOTIC
 
David Kaplan
Principal Security Researcher, Microsoft
 
Adam Pennington
MITRE ATT&CK
 
JB
Incident management, detection, and monitoring
 
Sarah Yoder
Cyber Security Engineer, MITRE
 
Erika Noerenberg
Principal Threat Researcher, Carbon Black
 
Nolan Forrest
HIPAA Security Officer, Union Hospital of Cecil County
 
Scott Hanson
Senior Vice President, Cyber Risk, Kroll
 
Greg Foss
Senior Threat Researcher, Carbon Black
 
John Wunder
Principal Cyber Security Engineer, MITRE
 
Rick McElroy
Head of Security Strategy, Carbon Black
 
Brian Baskin
Senior Threat Researcher, Carbon Black
 
Justin Henderson
Founder & CEO, H&A Security Solutions; SANS Instructor
 
Brenden Smith
Chief Information Security Officer, First Bank
 
Blake Strom
Principal Cyber Security Engineer, MITRE
 
Ben Johnson
Co-Founder & CTO of Obsidian Security, Co-Founder of Carbon Black
 
James Tarala
Information Security Specialist, Senior SANS Instructor
 
Robert M. Lee
Founder and CEO, Dragos, Inc.; SANS Instructor & Course Author
 
Jamison Utter
Principle Security Consultant, Infoblox
 
Scott Worden
Security Engineer, Insurance Company
 
Jason Garman
Director, Developer Relations at Carbon Black
 
Tim Collyer
Director, Information Security at Motorola Solutions
 
Bob Argenbright
Senior Security Engineer, Heroku
 
Brandon Denker
Director of Research and Intelligence at Cyborg Security, Inc.
 
Grover Mewborn
Senior Security Engineer at CoStar
 
Josh Rickard
Senior Solutions Architect at Swimlane
 

From overwhelmed to obsessed: one security professional’s EDR journey

 

Defense evasion: why is it so prominent & how can you detect it?

 

Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests

 

Security Operations Lessons: What My Team Learned Building and Maturing a SOC

 

Why a SIEM Won’t Solve All Your Problems: 5 Common Issues and How to Avoid Them

 

Cybersecurity Isn’t Always Easy and You’re Not Alone

 
 
Back to Top