Get full endpoint visibility, detection, and response.
Empower your teams with science-backed security awareness training.
Protect your Microsoft 365 identities and email environments.
Managed threat response and robust compliance support at a predictable price.
Packed with the information, tools, and guidance you need to keep your organization running smoothly and, most importantly, your patients safe.
Key Methods had seen their share of security incidents. But when one of their clients suffered a mass-isolation event, they realized they were flying blind. Attackers had accessed sensitive data, but without clear logs, they were left scrambling.
Principal Security Researcher, turning cyber criminals into examples. The Blue Teamer's Red Teamer. Successfully hiked 2,200 miles of the Appalachian Trail. Former Staff @ MIT LL.
Traitorware Court: The Case For SigParser
Never Just One Termite: Six Months of Researching OAuth Application Attacks
Oh, Auth 2.0! Device Code Phishing in Google Cloud and Azure
Mommy, Does Santa Like NordVPN?
To MFA or Not to MFA: How Multi-Factor Authentication Saves the SMB
Turning TTPs into CTF Challenges: Huntress CTF 2024 Retro
Unmasking the Central Villain: Inside Adversary-in-the-Middle Attacks
Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft
RATs! Remote Management Software from the Hacker’s Perspective
Combating Emerging Microsoft 365 Tradecraft: Initial Access
The Hackers in the Arena: The Huntress CTF Retrospective