Skip Navigation
Get a Demo

Red Canary Guest Contributors

Bringing together voices of the security community

Interested in writing a guest blog or participating in a webinar? Email us at and share your ideas!

Michel de Crevoisier
Senior Security Analyst & Threat Detection lead
Terence Jackson
David Kaplan
Principal Security Researcher, Microsoft
Adam Pennington
Incident management, detection, and monitoring
Sarah Yoder
Cyber Security Engineer, MITRE
Erika Noerenberg
Principal Threat Researcher, Carbon Black
Nolan Forrest
HIPAA Security Officer, Union Hospital of Cecil County
Scott Hanson
Senior Vice President, Cyber Risk, Kroll
Greg Foss
Senior Threat Researcher, Carbon Black
John Wunder
Principal Cyber Security Engineer, MITRE
Rick McElroy
Head of Security Strategy, Carbon Black
Brian Baskin
Senior Threat Researcher, Carbon Black
Justin Henderson
Founder & CEO, H&A Security Solutions; SANS Instructor
Brenden Smith
Chief Information Security Officer, First Bank
Blake Strom
Principal Cyber Security Engineer, MITRE
Ben Johnson
Co-Founder & CTO of Obsidian Security, Co-Founder of Carbon Black
James Tarala
Information Security Specialist, Senior SANS Instructor
Robert M. Lee
Founder and CEO, Dragos, Inc.; SANS Instructor & Course Author
Jamison Utter
Principle Security Consultant, Infoblox
Scott Worden
Security Engineer, Insurance Company
Jason Garman
Director, Developer Relations at Carbon Black
Tim Collyer
Director, Information Security at Motorola Solutions
Bob Argenbright
Senior Security Engineer, Heroku
Brandon Denker
Director of Research and Intelligence at Cyborg Security, Inc.
Grover Mewborn
Senior Security Engineer at CoStar
Josh Rickard
Senior Solutions Architect at Swimlane

From overwhelmed to obsessed: one security professional’s EDR journey


Defense evasion: why is it so prominent & how can you detect it?


Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests


Security Operations Lessons: What My Team Learned Building and Maturing a SOC


Why a SIEM Won’t Solve All Your Problems: 5 Common Issues and How to Avoid Them


Cybersecurity Isn’t Always Easy and You’re Not Alone

Back to Top