87% of enterprises use two or more cloud environments to run their applications. Multi-cloud accelerates digital transformation, but also introduces complexity and risk, resulting in a chaotic reality for many organizations.
Conquer Cloud Chaos with VMware Cross-Cloud services
VMware is addressing cloud chaos with our portfolio of multi-cloud services, VMware Cross-Cloud services, which enable you to build, run, manage, secure, and access applications consistently across cloud environments.
With VMware Cross-Cloud services, you can address cloud chaos and shift to a cloud smart approach – one where you can choose the best environment for every application, without multiplying your complexity.
Main Menu
Anywhere Workspace
Access Any App on Any Device Securely
App Platform
Build and Operate Cloud Native Apps
Cloud & Edge Infrastructure
Run Enterprise Apps Anywhere
Cloud Management
Automate and Optimize Apps and Clouds
Desktop Hypervisor
Manage apps in a local virtualization sandbox
Security & Networking
Connect and Secure Apps and Clouds
Run VMware on any Cloud. Any Environment. Anywhere.
Main Menu
Solutions
By Industry
VMware AI Solutions
Accelerate and ensure the success of your generative AI initiatives with multi-cloud flexibility, choice, privacy and control.
Main Menu
For Customers
For Partners
Working Together with Partners for Customer Success
See how we work with a global partner to help companies prepare for multi-cloud.
The VMware Threat Analysis Unit (TAU) is composed of leading minds in cybersecurity research and analysis.
Meet the TAU Talent
Our job is to keep you safe by researching and analyzing the ever-evolving tactics, techniques, and procedures (TTPs) of sophisticated actors and understanding how to prevent and detect their attacks.
Brian Baskin is a Technical Lead on the VMware Threat Analysis Unit with over 20 years of experience in digital forensics, incident response, and malware analysis. He was previously an analyst for the US Defense Cyber Crime Center (DC3) where he specialized in investigating network intrusions against military assets and analyzing new malware attack campaigns. As an incident responder, he has managed large-scape responses and investigated many complex attacks. He has authored multiple security books and actively develops open source tools for more efficient malware analysis and incident response.
Since entering the industry, Taree Reardon has been fascinated with identifying and dissecting new and emerging threats. Taree particularly enjoys endpoint detection and incident response and is a GIAC certified Incident Handler. As part of her research, Taree regularly works on product efficacy initiatives. During her time at VMware Carbon Black, Taree has helped identify and analyze several new attack variants, including one of the first known exploits of the BlueKeep vulnerability in a customer’s environment. Taree has recently found a passion for mentoring and teaching the next generation of security professionals and has delivered a wide range of talks at B-Sides Boulder, Security Connect, and through online webinars.
Stefano Ortolani is Staff Engineer 2 at VMware, formerly Director of Threat Research at Lastline, where he joined in 2015 as a Security Researcher. In his current role, Stefano focuses on finding novel approaches to investigate, classify, and detect unknown cyber tradecraft. Prior to Lastline, he was part of the Global Research and Analysis Team at Kaspersky Lab, in charge of fostering operations with CERTs, governments, universities, and law enforcement agencies, as well as conducting research of the global threat landscape. He received his Ph.D. in Computer Science from VU University Amsterdam. Stefano is a regular speaker at technical conferences and authored/co-authored numerous research papers presented at venues such as Virus Bulletin, Security Analyst Summit, Underground Economy, and Black Hat.
Takahiro Haruyama is a Sr. Threat Researcher on the VMware Threat Analysis Unit (TAU), with over ten years of extensive experience and knowledge in malware analysis and digital forensics. He previously worked on reverse-engineering cyber espionage malware with Symantec's threat intelligence team. He has spoken at several notable conferences including Virus Bulletin, REcon, HITB, SANS DFIR Summit, and BlackHat Briefings USA/Europe/Asia.
Lavine Oluoh is a Threat Response Analyst with the Carbon Black Managed Detection and Response (MDR) Team. She is at the forefront helping customers defend against the latest attacks in their environment. Lavine spends most of her time analyzing fully or partially successful breaches to understand the current attack techniques and how best to defend against them. She is a GIAC certified Malware Reverse-Engineer with interest in forensic investigations, incident response and endpoint security.
Sebastiano Mariani is a Threat Researcher at VMware, where he recently joined. Prior to that, he worked as a researcher in Seclab at the University of California, Santa Barbara. His main interests are malware analysis and reverse engineering, but he also enjoys building network infrastructures and tools to aid security researchers in their daily tasks. He also enjoys participating and hosting capture the flag competition with the Shellphish team with whom he participated in DEF CON CTF finals for several years. He is also a previous Black Hat speaker where he presented his research on two occasions (Black Hat USA 2016 and Black Hat Europe 2017).
Swee Lai Lee is a Threat Researcher in the VMware Threat Analysis Unit (TAU). She is responsible for research to translate evolving attacker endpoint behavior into tactical defenses. For 10 years, she has focused on malware analysis, security efficacy and threat hunting.
Giovanni Vigna is the Sr. Director of Threat Intelligence at VMware. He is also a Professor in the Department of Computer Science at the University of California in Santa Barbara (on leave). His research interests include malware analysis, vulnerability assessment, the underground economy, binary analysis, web security, and the applications of machine learning to security problems. Giovanni is also the founder of the Shellphish hacking group, who has participated in more DEF CON CTF competitions than any other group in history. He is an IEEE Fellow and an ACM Fellow.
Oleg Boyarchuck is a threat researcher at VMware. He is passionate about malware, vulnerabilities, reverse engineering, and Windows internals. Prior to joining VMware, he worked as a reverse engineer at Lastline where he was responsible for malware research and detection improvements. Before that, he worked as a kernel driver developer at Avira developing the core functionality of the Avira Antivirus.