chat
expand_more

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
August 31, 2022

Zehan Wang has had an impressive career. Now a UK-based angel investor, Zehan was previously co-founder and CTO of Magic Pony, a machine learning startup acquired by Twitter within just two years of founding.

Recently, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sat down with Zehan to chat about his remarkable journey as an engineering leader. In part one of the episode, David and Zehan explored how Zehan started his career in tech, his entrepreneurship, the founding of Magic Pony, and how Twitter came to acquire the company.

In part two, David and Zehan delve into Zehan’s experience as an angel investor in the UK. They discuss:

  • How to intelligently select investments

  • The importance of people management

  • Choosing a startup as a job seeker and as an investor

  • Establishing equity at a startup

We hope you enjoy it! Don’t forget to subscribe to Abnormal Engineering Stories on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Complex Case of Account Compromise Blog
Discover how Abnormal helped one organization detect the sophisticated tactics an attacker used to compromise an employee's email account.
Read More
B Cross Platform Account Takeover
Discover the dangers of cross-platform account takeover, the challenges of detecting this attack, and how to implement proactive protection against ATO.
Read More
B 5 17 24 Legal
Learn how cybercriminals use superficial disclaimers to deceive others while facilitating illegal activity on cybercrime forums.
Read More
B Cybersecurity Influencers Blog 2024
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 15 innovative and influential thought leaders on social media.
Read More
B 5 13 24 Docusign
Cybercriminals are abusing Docusign by selling customizable phishing templates on cybercrime forums, allowing attackers to steal credentials for phishing and business email compromise (BEC) scams.
Read More
B CRN
Abnormal employees honored as CRN 2024 Women of the Channel for their influential leadership in the tech industry.
Read More