Jamie TollesBlogApp Attacks: The Growing Danger of App Consent Misuse in the CloudAugust 7, 20245 minute readBlogMFA Bypass Attacks: Why MFA is Not a CYAFebruary 13, 20245 minute readBlogThreat-Informed Response: Accelerating Investigation and RecoveryFebruary 21, 20233 minute read