With a career in cybersecurity that started over 15 years ago, my work has traversed the security landscape: managing incident responses, designing endpoint detection and investigative methodologies, and leading compromise assessments to identify targeted threats.
Read full article on Dark Reading: Cloud