chat
expand_more

Abnormal Engineering Stories, Episode #10: Examining the UK Startup Ecosystem

In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
July 28, 2022

In 2016, less than two years after co-founding Magic Pony, Zehan Wang and his partner found themselves signing an acquisition agreement with Twitter. Their machine learning-based visual processing technology caught Twitter’s eye during Nvidia GTC, and the rest, as they say, is history.

For the next five years, Zehan worked as a people manager at Twitter, first in charge of the machine learning software engineering team and then eventually as Head of Cortex Applied Research. In 2021, Zehan decided to change course and became an angel investor.

In part one of this two-part episode, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, explores how Zehan started his career in tech and his entrepreneurship. They discuss:

  • The founding (and eventual acquisition) of Magic Pony

  • The startup ecosystem in the UK

  • How to choose your next role

We hope you enjoy it! Don’t forget to subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #10: Examining the UK Startup Ecosystem

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Earn Your CPE Credits with Abnormal
Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
Read More
B Seg Lessons
Discover key insights gleaned from replacing 100+ SEGs for Abnormal customers.
Read More
B Europe Attack Data Blog
Discover what our research uncovered about the European threat landscape and attack trends for organizations in the region.
Read More
B SAT
Abnormal aims to provide superior detection of email attacks while also directly and indirectly influencing the security awareness of your employees.
Read More
B 6 3 24 BEC Attacks
Discover how cybercriminals obtain corporate data from brokers like ZoomInfo and Apollo to enable targeted business email compromise (BEC) attacks.
Read More
B Addressing Account Takeovers Blog
Discover how security leaders are protecting their organizations against account takeover with insights from our survey of 300 cybersecurity stakeholders.
Read More