Dennis on Cybersecurity
Subscribe
Sign in
Home
Notes
Archive
About
Defending the New Digital Identity:
Proactive Prevention of Key, Token, and Credential Theft
Oct 3
•
Dennis Underwood
1
September 2025
The Persistence Problem in Non-Windows Security
Non-Windows operating systems are sometimes LESS secure
Sep 26
•
Dennis Underwood
1
The Invisible Intruder: The Fusion of Remote Access Tools and Hacker Automation
How not to feed white-hat researchers all your stolen data, or if you aren't a criminal...why isn't my malware sample trying to steal any data?
Sep 19
•
Dennis Underwood
2
The Unseen Hand: Understanding and Countering the Threat of Hacker Automation
This ain't your dad's hackers
Sep 12
•
Dennis Underwood
2
Whitepaper: The Technical and Business Failures of Ransomware Key Capture Defense
Been There. Done That. Am I too young to write my memoirs on the matter?
Sep 5
•
Dennis Underwood
2
The Evolution of AI in Cybersecurity: From Herd Defense to Intelligent Protection
The Herd Defense Model: A Reactive Past
Sep 1
•
Dennis Underwood
2
Coming soon
Weeks of content scheduled...
Sep 1
•
Dennis Underwood
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts