Dennis on Cybersecurity

Dennis on Cybersecurity

Home
Notes
Archive
About
Defending the New Digital Identity:
Proactive Prevention of Key, Token, and Credential Theft
Oct 3 • 
Dennis Underwood

September 2025

The Persistence Problem in Non-Windows Security
Non-Windows operating systems are sometimes LESS secure
Sep 26 • 
Dennis Underwood
The Invisible Intruder: The Fusion of Remote Access Tools and Hacker Automation
How not to feed white-hat researchers all your stolen data, or if you aren't a criminal...why isn't my malware sample trying to steal any data?
Sep 19 • 
Dennis Underwood
The Unseen Hand: Understanding and Countering the Threat of Hacker Automation
This ain't your dad's hackers
Sep 12 • 
Dennis Underwood
Whitepaper: The Technical and Business Failures of Ransomware Key Capture Defense
Been There. Done That. Am I too young to write my memoirs on the matter?
Sep 5 • 
Dennis Underwood
The Evolution of AI in Cybersecurity: From Herd Defense to Intelligent Protection
The Herd Defense Model: A Reactive Past
Sep 1 • 
Dennis Underwood
Coming soon
Weeks of content scheduled...
Sep 1 • 
Dennis Underwood
© 2025 Dennis Underwood
Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture