chat
expand_more

Abnormal Engineering Stories, Episode #10: Examining the UK Startup Ecosystem

In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
July 28, 2022

In 2016, less than two years after co-founding Magic Pony, Zehan Wang and his partner found themselves signing an acquisition agreement with Twitter. Their machine learning-based visual processing technology caught Twitter’s eye during Nvidia GTC, and the rest, as they say, is history.

For the next five years, Zehan worked as a people manager at Twitter, first in charge of the machine learning software engineering team and then eventually as Head of Cortex Applied Research. In 2021, Zehan decided to change course and became an angel investor.

In part one of this two-part episode, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, explores how Zehan started his career in tech and his entrepreneurship. They discuss:

  • The founding (and eventual acquisition) of Magic Pony

  • The startup ecosystem in the UK

  • How to choose your next role

We hope you enjoy it! Don’t forget to subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #10: Examining the UK Startup Ecosystem

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B E Rate
Discover how AI-powered email protection ensures a secure digital learning environment.
Read More
B Healthcare Industry Attack Trends Blog
Targeted attacks on the healthcare industry are on the rise. Explore the latest threat trends and learn how to protect your organization.
Read More
B URL
Explore how attackers exploit rewritten URLs to gain unauthorized access, highlighting traditional security vulnerabilities and the need for modern tools.
Read More
B SOC Experts
Explore insights from SOC leaders on the evolving landscape of social engineering threats, highlighting human vulnerabilities and strategies to enhance cybersecurity.
Read More
B Cybersecurity Awareness Month Engage Educate Empower
Happy Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats with these 5 tips.
Read More
B Top Mortgage Lender Replaces Proofpoint with Abnormal
Discover how a leading mortgage lender saved money and stopped more attacks by replacing its Proofpoint SEG with Abnormal’s API-based behavioral AI solution.
Read More