Coffee Consumer. Cybersecurity Enthusiast. Former Content Strategist at Huntress.
Practical Tips for Conducting Digital Forensics Investigations
Four Sneaky Attacker Evasion Techniques You Should Know About
All in a Day’s Work: Fighting Log4Shell with Huntress Managed EDR
Recap: Navigating the NIST Cybersecurity Framework
One Year Later: Lessons Learned from the Colonial Pipeline Cyberattack
Product Support the Huntress Way
A Day in the Life of a Security Researcher
Leaving the Silo: MSP Vendors Give Back