- Threat StackSenior Software Engineer, 2015 - present
- Bit9Senior Software Engineer, 2011 - 2015
- PDMA-CDMA Educational FoundationBoard Trustee, 2010 - 2012
- BAE SystemsSenior Software Engineer, 2008 - 2011
- ScanSoftLanguage Modeling Team Intern, 2002 - 2002
- Kurzweil Applied IntelligenceResearch Assistant, 1997 - 1997
- Kingdom Rush
- Plants vs. Zombies 2
What All DevOps Teams Should Know About The AWS Shared Responsibility Model
The first step in implementing security in the cloud is to understand where the AWS Shared Security Model ends and where your responsibility
Scale it to Billions — What They Don’t Tell you in the Cassandra README
This blog post explains the lessons Threat Stack learned using Cassandra over the past year.
What Enterprise Security Can Learn From Silicon Valley
Most enterprises do not build software or operate infrastructure the same way Netflix does. But there’s a lot to learn from the Silicon Vall
“The Call is Coming from Inside the House” Insider Threats Pose Major Se...
Security is a major concern and potential road block for companies starting up in the cloud or considering a move into the cloud. Incidents
A framework to help make sense of cybersecurity tools | Network World
Many security tools are fragmented, and as a result it is often difficult to describe, categorize and compare various security tools given t
Introducing Brian Ahern as Threat Stack’s New Chairman & CEO
We are pleased to announce the appointment of Brian Ahern as Threat Stack's new Chairman and Chief Executive Officer.
Applying The Principles of The Quantified Self to Cloud Security
Quantified self introduces an aspect of continuous monitoring. It allows us to fine tune security, respond to issues, and make incidents les
How Utah Became the Next Silicon Valley - The New Yorker
Cities looking to attract innovative businesses and top employees could learn a lot from Draper, Utah.
Symantec estimates that antivirus software catches just 45% of cyberatta...
Symantec is joining rivals in developing technology that aims to spot hacking and minimize the damage, acknowledging that the antivirus soft
Carbon Black for Techies: ‘A Distributed Process Monitor’
I am frequently asked to give the “elevator pitch” for the Carbon Black security solution. When speaking to someone who is technical and fam