Unmasked: Supply chain attacksWebinars & videosUnmasked: Supply chain attacksWhy enterprises should be rethinking the software they use and more.
Never let a server fall out of sync with a databaseBlogsNever let a server fall out of sync with a databaseHow we make changes to our database without bringing other systems down.
Exmatter: Clues to the future of data extortionResearchExmatter: Clues to the future of data extortionAn analysis of Exmatter and a look at the potential future of the threat landscape.
Security at StairwellBriefs & sheetsSecurity at StairwellStairwell’s approach to security and compliance for the Stairwell platform.
Threat report: Maui ransomwareResearchThreat report: Maui ransomwareA technical overview of Maui ransomware to provide a starting point for research.
Beneath the surface of Maui ransomwareWebinars & videosBeneath the surface of Maui ransomwareGet an inside look at Maui ransomware, the threat actors behind it, and more.
Triage every alert with research-grade understandingBriefs & sheetsTriage every alert with research-grade understandingTriage every alert with the level of understanding that you get from a senior analyst.
Make the threat-of-the-day a non-eventBriefs & sheetsMake the threat-of-the-day a non-eventStop hoping that the latest cyberattack or vulnerability headline doesn’t affect your business.
Detect hidden threatsBriefs & sheetsDetect hidden threatsGain visibility into malicious activity that traditional point-in-time defenses miss.
Create customized defenses with contextual intelBriefs & sheetsCreate customized defenses with contextual intelBuild a tailored defense system based on the unification of external and internal intel.
Scalable data processing with a distributed job schedulerBlogsScalable data processing with a distributed job schedulerHow we redesigned our job-scheduling system to remove the database as a bottleneck.
Black hoodies not requiredBlogsBlack hoodies not requiredOne of the hardest challenges in cybersecurity is hiring for cybersecurity.
The origin story of APT32 macros: The StrikeSuit Gift that keeps givingResearchThe origin story of APT32 macros: The StrikeSuit Gift that keeps givingUnearth a demon from the ancient world: a malware source code package called StrikeSuit Gift.
The ink-stained trail of GOLDBACKDOORResearchThe ink-stained trail of GOLDBACKDOORGet the technical analysis of GOLDBACKDOOR.
Learnings that shaped my leadership styleBlogsLearnings that shaped my leadership styleImportant lessons, management skills, and philosophies that have helped me along the way.