I’m fascinated by the impact that individuals and teams can have on the dynamics between IT defenders and online threat actors. The industry is still relatively immature, and even small efforts can make a big difference.
Is it better to perform product management of information security solutions at a large company or at a startup? Picking the...Read more
This cheat sheet offers advice for product managers of new IT solutions at startups and enterprises. To print it, use the...Read more
CrowdStrike acquired Payload Security, the company behind the automated malware analysis sandbox technology Hybrid...Read more
This cheat sheet outlines tips for reversing malicious Windows executables via static and dynamic code analysis with the...Read more
When analyzing malware or performing other security research, it's often useful to tunnel connections through a VPN in a...Read more
Startups are the innovation engine of the high-tech industry. Those who've participated in them have experienced the thrill...Read more
"Zero-day" is the all-powerful boogieman of the information security industry. Too many of us invoke it when discussing...Read more
What's the deal with "fileless malware"? Though many security professionals cringe when they hear this term, lots of...Read more
As much as I look forward to change sometimes, I am often hesitant to forego the familiar despite recognizing the risks of...Read more
Life rushes forward at the speed of a bullet train. I struggle finding the time to pause and reflect upon the journey...Read more