My Writing
- Social Engineering Scammers in Action: Domain Names and Family Resettlement to Australia Scammers sent emails impersonating Australian immigration authorities to collect passport copies, photos, fingerprints, and personal details for identity theft. They used domain names with misleading...
- Malware Analysis A Series of Introductory Malware Analysis Webcasts
- Malware Analysis Mastering 4 Stages of Malware Analysis Malware analysis techniques form a pyramid of increasing complexity: fully-automated analysis, static properties examination, interactive behavioral analysis, and manual code reversing. Analysts...
- Incident Response Speaking at the Forensic Lunch
- Fun Rock-Paper-Scissors Game
- Leadership Know Your Firm's Economic Moat to Keep Security Relevant Effective security decisions require understanding your company's economic moat—the competitive advantages that protect it from rivals. Framing risks in terms of threats to these moats (brand equity,...