Cyberhaven: 8 New Compromised Extensions Exposed—1.1M Users Affected! Read the Full Blog Now

William Tran

Avatar photo

William Tran

Product Manager at Spin.AI

Will Tran is the Product Manager at Spin.AI, where he guides the product's strategic direction, oversees feature development and ensures that the solution solves his clients’ cybersecurity needs.

Will is a security professional who started his career at Lockheed Martin where he worked on National Security Space programs in business development and product management.

Will holds a BA in Economics and Mathematics from UCSB and an MBA with a specialization in Technology Management and Marketing from UCLA Anderson School of Management.

At Lockheed Martin, Will developed the multi-year strategy campaign and supported the product development of a national security satellite program for the United States Air Force, which resulted in a multi-billion dollar contract.

During business school, Will consulted 2 non-profit organizations as part of a series of national consulting case competitions. He set strategic priorities, optimized business operations, and developed a process to qualify new revenue streams for his non-profit clients. These initiatives resulted in 15-20% increase in annual surplus.

In his spare time, Will can be found at local coffee shops around Los Angeles, traveling to different countries, or hanging out with his cat.

Blog Posts by William Tran

Advanced Backup and Recovery Options for Google Workspace Administrators

Advanced Backup and Recovery Options for Google Workspace Administr...

Article Summary: Data loss in Google Workspace can be catastrophic for businesses. While Google offers...

Avatar photo

Product Manager

Read more
Securing the Gateway: How Browser Extension Risk Assessment Protects Your Organization

Securing the Gateway: How Browser Extension Risk Assessment Protect...

Browser extensions are a normal component of today’s modern web browsers. They serve the purpose...

Avatar photo

Product Manager

Read more
How to Backup Microsoft Teams Chat: Save History, Conversations, Files and More

How to Backup Microsoft Teams Chat: Save History, Conversations, Fi...

Microsoft Teams has become a central hub for workplace communication, allowing teams real-time collaboration, file...

Avatar photo

Product Manager

Read more
The Escalating Threat of Malicious Browser Extensions: How to Protect Your Organization

The Escalating Threat of Malicious Browser Extensions: How to Prote...

Browser extensions are part of modern tooling that organizations and users make use of to...

Avatar photo

Product Manager

Read more
What is SSPM? SaaS Security Posture Management

What is SSPM? SaaS Security Posture Management

Article Summary:SaaS Security Posture Management (SSPM) is essential for protecting cloud-based applications from security breaches,...

Avatar photo

Product Manager

Read more
From Convenience to Catastrophe: The Real Cost of Unchecked Browser Extensions

From Convenience to Catastrophe: The Real Cost of Unchecked Browser...

Why Browser Extensions Are a Growing Security Threat Browser extensions have become a staple in...

Avatar photo

Product Manager

Read more
The AI Backdoor: How Browser Extensions Bypass Your ‘No GenAI Policy’

The AI Backdoor: How Browser Extensions Bypass Your ‘No GenAI Pol...

In an era where generative AI (GenAI) is transforming industries, organizations are increasingly implementing strict...

Avatar photo

Product Manager

Read more
Backup and Recovery Methods for Google Workspace

Backup and Recovery Methods for Google Workspace

Article Summary Backing up Google Workspace data is essential to protect against data loss due...

Avatar photo

Product Manager

Read more
A Guide to SaaS Security Posture Management (SSPM) Solutions for Microsoft 365

A Guide to SaaS Security Posture Management (SSPM) Solutions for Mi...

SSPM Solutions for Microsoft 365 Summary: In this article we discuss the importance of SaaS...

Avatar photo

Product Manager

Read more
Recent Healthcare Data Breaches Expose Growing Cybersecurity Risks

Recent Healthcare Data Breaches Expose Growing Cybersecurity Risks

Healthcare organizations continue to face rising cyber threats, with multiple major data breaches in 2025...

Avatar photo

Product Manager

Read more
Best MSP Disaster Recovery Solution

Best MSP Disaster Recovery Solution

MSP Disaster Recovery Solutions Summary: A reliable MSP disaster recovery solution is crucial for minimizing...

Avatar photo

Product Manager

Read more
Effective Strategies for Data Backup and Recovery in Healthcare

Effective Strategies for Data Backup and Recovery in Healthcare

Data Backup and Recovery for Healthcare Summary The healthcare sector faces significant challenges due to...

Avatar photo

Product Manager

Read more
A Look at the Best SSPM Solutions for Google Workspace

A Look at the Best SSPM Solutions for Google Workspace

SaaS Security Posture Management (SSPM) solutions are essential for securing Google Workspace as well as...

Avatar photo

Product Manager

Read more
Cyberhaven: Latest Research Reveals 8 Additional Compromised Extensions Affecting 1.1 Million Users

Cyberhaven: Latest Research Reveals 8 Additional Compromised Extens...

Spin.AI’s latest research has uncovered 8 additional compromised browser extensions, used by 1.1 million users...

Avatar photo

Product Manager

Read more
Managed Service Provider Best Practices in Data Backup and Disaster Recovery

Managed Service Provider Best Practices in Data Backup and Disaster...

Highlights the importance of a robust data backup and recovery program provided by Managed Service...

Avatar photo

Product Manager

Read more
A Guide to Data Loss Prevention for Managed Service Providers

A Guide to Data Loss Prevention for Managed Service Providers

Data loss prevention (DLP) is critical for Managed Service Providers (MSPs) to safeguard sensitive client...

Avatar photo

Product Manager

Read more
Exposing the Hidden Risks of Browser Extensions: Cyberhaven’s Breach Unveiled

Exposing the Hidden Risks of Browser Extensions: Cyberhaven’s...

Today’s digital landscape is under attack like never before. Threat actors are looking for the...

Avatar photo

Product Manager

Read more
Midnight Blizzard Attack on Microsoft: Key Lessons for Strengthening Your SaaS Security

Midnight Blizzard Attack on Microsoft: Key Lessons for Strengthenin...

From November 2023 to January 2024, the Midnight Blizzard cyberattack targeted Microsoft’s Azure Active Directory...

Avatar photo

Product Manager

Read more