chat
expand_more

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
August 31, 2022

Zehan Wang has had an impressive career. Now a UK-based angel investor, Zehan was previously co-founder and CTO of Magic Pony, a machine learning startup acquired by Twitter within just two years of founding.

Recently, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sat down with Zehan to chat about his remarkable journey as an engineering leader. In part one of the episode, David and Zehan explored how Zehan started his career in tech, his entrepreneurship, the founding of Magic Pony, and how Twitter came to acquire the company.

In part two, David and Zehan delve into Zehan’s experience as an angel investor in the UK. They discuss:

  • How to intelligently select investments

  • The importance of people management

  • Choosing a startup as a job seeker and as an investor

  • Establishing equity at a startup

We hope you enjoy it! Don’t forget to subscribe to Abnormal Engineering Stories on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Missed Attack Vendor Relationships
Discover how attackers exploit vendor relationships for credential phishing and how Abnormal Security’s AI-driven defense stops these attacks in real time, preventing account takeovers and minimizing risk.
Read More
B 1500x1500 MKT790 Deep Seek Open Graph Images
Cyber attackers may be using DeepSeek to create more email attacks. Worry less about AI-powered attacks with AI-powered protection from Abnormal Security.
Read More
ABN Innovate Blog 4 L1 R1
Did you miss Innovate 2025? Check out our major key takeaways from the conference, where we dive into how AI is transforming cyber threats, and cybersecurity, today.
Read More
B Proofpoint Customer Story Blog 11
See how Abnormal's AI helped a premium hospitality provider detect 1,366 threats missed by Proofpoint and save 766 hours/month in employee productivity.
Read More
B Ghost GPT Blog
Cybercriminals use GhostGPT, an uncensored AI chatbot, for malware creation, BEC scams, and more. Learn about the risks and how AI fights back.
Read More
B APAC Email Security Threats
Email attacks on APAC organizations, including phishing and BEC, are rising. See why AI-native email security is crucial to countering modern cyber threats.
Read More