Ken Dunham
Senior Director, Technical Cyber Threat Intelligence
Ken Dunham has spent 30 years in cybersecurity, consulting in adversarial counterintelligence, forensics, Darknet Special Ops, phishing and hacking schemes, AI/BI, machine learning and threat identification.
Image
Blockchain_change_world_1_list_476x210

October 23, 2018

There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is....

Blog

Image
phishing_rest_of_story_list_476x210

May 29, 2018

Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this....

Blog

Image
pass_hash_list_476x210

March 14, 2018

Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from....

Blog

Image
gen_blog_list_item

September 07, 2017

Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how....

Blog

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?