☰

Lenny Zeltser

  •  
Close
  • Information Security
  • Technology
  • Malicious Software
  • Cloud Services Research
  • Consulting Research
  • Toy Chest
  • Blog
  • About
  • Contact
  • Search
Close

Information Security
in Business

Advance
Information Security

I'm fascinated by the impact that individuals and teams can have on the dynamics between IT defenders and threat actors.

What's It Like for a New CISO?

Top 10 Cybersecurity Writing Mistakes

Information Security

Grow
Tech Businesses

I enjoy turning software and IT services into successful products, especially when they involve information security.

IT and Information Security Cheat Sheets

A Product Management Framework for Creating Security Products

Technology

Fight
Malicious Software

I've been continually expanding and sharing my expertise in curtailing the effects of malware on enterprises.

Mastering 4 Stages of Malware Analysis

The Language and Nature of Fileless Attacks Over Time

Malicious Software

RSS Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. You can get into this field by building upon your existing skills in any of these disciplines. As someone who's helped thousands of security
Tweets by lennyzeltser

Copyright © 1995-2021 Lenny Zeltser. All rights reserved.