Note: This blog post was originally posted on the Office365 Security Blog here. In our last post, we discussed how Event Tracing for Windows (ETW) provides a wealth of knowledge in addition to
…
read more »
Note: This blog post was originally posted on the Office365 Security Blog here. Today's defenders face an increasing obstacle with information asymmetry. With the advent of in-memory attacks and targeted malware, defenders cannot
…
read more »
A persistent theme for the entirety of my adult life as a programmer has been attempting to learn the Haskell programming language. Everything about the language appeals to me, from strong static typing
…
read more »