Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
August 31, 2022

Zehan Wang has had an impressive career. Now a UK-based angel investor, Zehan was previously co-founder and CTO of Magic Pony, a machine learning startup acquired by Twitter within just two years of founding.

Recently, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sat down with Zehan to chat about his remarkable journey as an engineering leader. In part one of the episode, David and Zehan explored how Zehan started his career in tech, his entrepreneurship, the founding of Magic Pony, and how Twitter came to acquire the company.

In part two, David and Zehan delve into Zehan’s experience as an angel investor in the UK. They discuss:

  • How to intelligently select investments

  • The importance of people management

  • Choosing a startup as a job seeker and as an investor

  • Establishing equity at a startup

We hope you enjoy it! Don’t forget to subscribe to Abnormal Engineering Stories on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 30 23 Teams
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Read More
Zoom BC
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Read More
B 5 22 23 SOC
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to Phishing attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More