Meet our contributors
Michel de Crevoisier
Senior Security Analyst & Threat Detection lead
Terence Jackson
CHIEF INFORMATION SECURITY & PRIVACY OFFICER AT THYCOTIC
David Kaplan
Principal Security Researcher, Microsoft
Adam Pennington
MITRE ATT&CK
JB
Incident management, detection, and monitoring
Sarah Yoder
Cyber Security Engineer, MITRE
Erika Noerenberg
Principal Threat Researcher, Carbon Black
Nolan Forrest
HIPAA Security Officer, Union Hospital of Cecil County
Scott Hanson
Senior Vice President, Cyber Risk, Kroll
Greg Foss
Senior Threat Researcher, Carbon Black
John Wunder
Principal Cyber Security Engineer, MITRE
Rick McElroy
Head of Security Strategy, Carbon Black
Brian Baskin
Senior Threat Researcher, Carbon Black
Justin Henderson
Founder & CEO, H&A Security Solutions; SANS Instructor
Brenden Smith
Chief Information Security Officer, First Bank
Blake Strom
Principal Cyber Security Engineer, MITRE
Ben Johnson
Co-Founder & CTO of Obsidian Security, Co-Founder of Carbon Black
James Tarala
Information Security Specialist, Senior SANS Instructor
Robert M. Lee
Founder and CEO, Dragos, Inc.; SANS Instructor & Course Author
Jamison Utter
Principle Security Consultant, Infoblox
Scott Worden
Security Engineer, Insurance Company
Jason Garman
Director, Developer Relations at Carbon Black
Tim Collyer
Director, Information Security at Motorola Solutions
Bob Argenbright
Senior Security Engineer, Heroku
Brandon Denker
Director of Research and Intelligence at Cyborg Security, Inc.
Grover Mewborn
Senior Security Engineer at CoStar
Josh Rickard
Senior Solutions Architect at Swimlane
Popular guest blogs
From overwhelmed to obsessed: one security professional’s EDR journey
Defense evasion: why is it so prominent & how can you detect it?
Defense evasion: why is it so prominent & how can you detect it?
Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests
Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests
Security Operations Lessons: What My Team Learned Building and Maturing a SOC
Security Operations Lessons: What My Team Learned Building and Maturing a SOC
Why a SIEM Won’t Solve All Your Problems: 5 Common Issues and How to Avoid Them
Why a SIEM Won’t Solve All Your Problems: 5 Common Issues and How to Avoid Them
Cybersecurity Isn’t Always Easy and You’re Not Alone