chat
expand_more

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
August 31, 2022

Zehan Wang has had an impressive career. Now a UK-based angel investor, Zehan was previously co-founder and CTO of Magic Pony, a machine learning startup acquired by Twitter within just two years of founding.

Recently, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sat down with Zehan to chat about his remarkable journey as an engineering leader. In part one of the episode, David and Zehan explored how Zehan started his career in tech, his entrepreneurship, the founding of Magic Pony, and how Twitter came to acquire the company.

In part two, David and Zehan delve into Zehan’s experience as an angel investor in the UK. They discuss:

  • How to intelligently select investments

  • The importance of people management

  • Choosing a startup as a job seeker and as an investor

  • Establishing equity at a startup

We hope you enjoy it! Don’t forget to subscribe to Abnormal Engineering Stories on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B 2024 Cybersecurity Predictions
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Read More
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B Unmasking Vendor Fraud
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More