With over two decades of experience in web security and infrastructure, I’ve had a front-row seat to the evolution of cyber threats. As co-founder of Peakhour.IO, I’ve been particularly fascinated by how attackers are leveraging residential proxy networks (RESIPs) to bypass traditional security controls and execute account takeovers. This led me to develop innovative network fingerprinting techniques that go beyond conventional IP-based security, helping Australian businesses detect and block sophisticated attacks that appear to come from legitimate residential networks.
My passion lies in finding fresh approaches to security challenges. Through research and hands-on experience dealing with real-world attacks, I’ve developed new methods for identifying malicious traffic, even when it’s hiding behind seemingly legitimate residential IPs. I regularly share these insights at security conferences across Australia, helping organizations understand how to protect themselves against the rising threat of RESIP-based account takeovers.
At Peakhour.IO, we’ve built Australia’s leading full-site delivery CDN that specializes in advanced threat detection, combining innovative fingerprinting techniques with behavioral analysis to distinguish between legitimate users and attackers, even when they’re using residential proxy networks.