At BeyondTrust Labs, we think the best way to understand cybersecurity threats is to install them. Our team of cybersecurity intelligence experts, with decades of industry expertise, perform unique research designed to identify emerging threats, exploitation techniques, and the latest generation of cyber-attacks. We get hands-on with malware and fileless ransomware every day. By understanding ever-evolving attack chains, we are able to dissect the methods of threat actors to help organizations like yours defend against them.

Focus Areas of BeyondTrust Labs

The independent research conducted by our experienced BeyondTrust Labs team provides us with essential fuel to stay one step ahead of fast-moving attackers and ever-evolving threats.

Morey Haber, CTO & CISO, BeyondTrust

Recent Cybersecurity Research and Content

Meet The Team Behind BeyondTrust Labs

James Maude, Lead Cybersecurity Researcher

James Maude is the Lead Cybersecurity Researcher at BeyondTrust. James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.

Morey Haber, Chief Information Security Officer & CTO

Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors.

Christopher Hills, Deputy CTO & CISO

Chris has more than 15 years’ experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy, and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Senior Solutions Architect consulting on PAM implementations and reports to the Office of the CTO as an acting Deputy CTO.

Prefers reduced motion setting detected. Animations will now be reduced as a result.