William Tran

William Tran

William Tran

Product Manager at Spin.AI

Will Tran is the Product Manager at Spin.AI, where he guides the product's strategic direction, oversees feature development and ensures that the solution solves his clients’ cybersecurity needs.

Will is a security professional who started his career at Lockheed Martin where he worked on National Security Space programs in business development and product management.

Will holds a BA in Economics and Mathematics from UCSB and an MBA with a specialization in Technology Management and Marketing from UCLA Anderson School of Management.

At Lockheed Martin, Will developed the multi-year strategy campaign and supported the product development of a national security satellite program for the United States Air Force, which resulted in a multi-billion dollar contract.

During business school, Will consulted 2 non-profit organizations as part of a series of national consulting case competitions. He set strategic priorities, optimized business operations, and developed a process to qualify new revenue streams for his non-profit clients. These initiatives resulted in 15-20% increase in annual surplus.

In his spare time, Will can be found at local coffee shops around Los Angeles, traveling to different countries, or hanging out with his cat.

Blog Posts by William Tran

Why Browser Extension Ownership Transfers are Enabling Malicious Code Injection

Why Browser Extension Ownership Transfers are Enabling Malicious Co...

We’ve been tracking a pattern that most security teams still haven’t had time to internalize....

William Tran

Product Manager

Read more
How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack Campaign

How Spin.AI’s Researchers Uncovered 14.2 Million More Victims...

The browser extension ecosystem just experienced one of its most sophisticated attacks to date. What...

William Tran

Product Manager

Read more
How to Grow Your MSP with Spin.AI: Scalable Cybersecurity and SaaS Protection for 2025

How to Grow Your MSP with Spin.AI: Scalable Cybersecurity and SaaS ...

AI has led to an explosion of new technology, changing client demands at the speed...

William Tran

Product Manager

Read more
Securing the Gateway: How Browser Extension Risk Assessment Protects Your Organization

Securing the Gateway: How Browser Extension Risk Assessment Protect...

Browser extensions are a normal component of today’s modern web browsers. They serve the purpose...

William Tran

Product Manager

Read more
How to Backup Microsoft Teams Chat: Save History, Conversations, Files and More

How to Backup Microsoft Teams Chat: Save History, Conversations, Fi...

Microsoft Teams has become a central hub for workplace communication, allowing teams real-time collaboration, file...

William Tran

Product Manager

Read more
The Escalating Threat of Malicious Browser Extensions: How to Protect Your Organization

The Escalating Threat of Malicious Browser Extensions: How to Prote...

Browser extensions are part of modern tooling that organizations and users make use of to...

William Tran

Product Manager

Read more
What is SSPM? Importance and Key Functions of SSPM Tools

What is SSPM? Importance and Key Functions of SSPM Tools

Article Summary:SaaS Security Posture Management (SSPM) is essential for protecting cloud-based applications from security breaches,...

William Tran

Product Manager

Read more
From Convenience to Catastrophe: The Real Cost of Unchecked Browser Extensions

From Convenience to Catastrophe: The Real Cost of Unchecked Browser...

Why Browser Extensions Are a Growing Security Threat Browser extensions have become a staple in...

William Tran

Product Manager

Read more
The AI Backdoor: How Browser Extensions Bypass Your ‘No GenAI Policy’

The AI Backdoor: How Browser Extensions Bypass Your ‘No GenAI Pol...

In an era where generative AI (GenAI) is transforming industries, organizations are increasingly implementing strict...

William Tran

Product Manager

Read more
A Guide to SaaS Security Solutions for Microsoft

A Guide to SaaS Security Solutions for Microsoft

SaaS Security Solutions for Microsoft 365 Summary In this article we discuss the importance of...

William Tran

Product Manager

Read more
Recent Healthcare Data Breaches Expose Growing Cybersecurity Risks

Recent Healthcare Data Breaches Expose Growing Cybersecurity Risks

Healthcare organizations continue to face rising cyber threats, with multiple major data breaches in 2025...

William Tran

Product Manager

Read more
Best MSP Disaster Recovery Solution

Best MSP Disaster Recovery Solution

MSP Disaster Recovery Solutions Summary: A reliable MSP disaster recovery solution is crucial for minimizing...

William Tran

Product Manager

Read more
Effective Strategies for Data Backup and Recovery in Healthcare

Effective Strategies for Data Backup and Recovery in Healthcare

Data Backup and Recovery for Healthcare Summary The healthcare sector faces significant challenges due to...

William Tran

Product Manager

Read more
Cyberhaven: Latest Research Reveals 8 Additional Compromised Extensions Affecting 1.1 Million Users

Cyberhaven: Latest Research Reveals 8 Additional Compromised Extens...

Spin.AI’s latest research has uncovered 8 additional compromised browser extensions, used by 1.1 million users...

William Tran

Product Manager

Read more
Managed Service Provider Best Practices in Data Backup and Disaster Recovery

Managed Service Provider Best Practices in Data Backup and Disaster...

Highlights the importance of a robust data backup and recovery program provided by Managed Service...

William Tran

Product Manager

Read more
A Guide to Data Loss Prevention for Managed Service Providers

A Guide to Data Loss Prevention for Managed Service Providers

Data loss prevention (DLP) is critical for Managed Service Providers (MSPs) to safeguard sensitive client...

William Tran

Product Manager

Read more
Exposing the Hidden Risks of Browser Extensions: Cyberhaven’s Breach Unveiled

Exposing the Hidden Risks of Browser Extensions: Cyberhaven’s...

Today’s digital landscape is under attack like never before. Threat actors are looking for the...

William Tran

Product Manager

Read more
Midnight Blizzard Attack on Microsoft: Key Lessons for Strengthening Your SaaS Security

Midnight Blizzard Attack on Microsoft: Key Lessons for Strengthenin...

From November 2023 to January 2024, the Midnight Blizzard cyberattack targeted Microsoft’s Azure Active Directory...

William Tran

Product Manager

Read more
Evaluating the Best Backup Services: What to Look For and Popular Options

Evaluating the Best Backup Services: What to Look For and Popular O...

If you’re here right now you’ve probably realized how important it is to backup your...

William Tran

Product Manager

Read more
How to Recover Deleted Messages from Microsoft Teams™

How to Recover Deleted Messages from Microsoft Teams™

In modern-day hybrid and remote work environments, collaboration and communication tools like Microsoft Teams are...

William Tran

Product Manager

Read more
Best CRXCavator Alternative for Browser Extension Risk Assessment

Best CRXCavator Alternative for Browser Extension Risk Assessment

Of the 300,000 browser extensions used in enterprise environments, more than half (51%) could execute...

William Tran

Product Manager

Read more
SpinBackup vs. Afi: Comparing 2 Top Backup Solutions

SpinBackup vs. Afi: Comparing 2 Top Backup Solutions

SpinBackup and Afi show up for leading backup solutions time and again so we compiled...

William Tran

Product Manager

Read more
Understanding Backup as a Service (BaaS): Your Complete Guide to Modern Data Protection

Understanding Backup as a Service (BaaS): Your Complete Guide to Mo...

There’s a lot of assumptions we still tend to make in our businesses and the...

William Tran

Product Manager

Read more
Obsidian Security vs. Spin.AI

Obsidian Security vs. Spin.AI

Partnering with third-party applications and browser extensions have clear benefits to increasing the efficiency of...

William Tran

Product Manager

Read more
What is the NIS2 Directive? Compliance Requirements and Checklist

What is the NIS2 Directive? Compliance Requirements and Checklist

With the rise of increasingly sophisticated cyber threats targeting all sectors, securing networks and information...

William Tran

Product Manager

Read more
Adaptive Shield vs. Spin.AI: Comparing Popular SSPM Solutions

Adaptive Shield vs. Spin.AI: Comparing Popular SSPM Solutions

As organizations increasingly rely on third-party applications to enhance productivity and streamline operations, the risks...

William Tran

Product Manager

Read more
Understanding the Risks of Browser Extensions

Understanding the Risks of Browser Extensions

Browser extensions have become an essential part of our daily lives and work environments. But...

William Tran

Product Manager

Read more
How Malicious Browser Extensions Steal Your Data and Security Risks

How Malicious Browser Extensions Steal Your Data and Security Risks

Many organizations are now focused on using cloud SaaS environments for many different things, including...

William Tran

Product Manager

Read more
SpinBackup vs. SysCloud: Comparing Popular Cloud Backup Services

SpinBackup vs. SysCloud: Comparing Popular Cloud Backup Services

The following breaks down the key features of top backup solutions and what these two...

William Tran

Product Manager

Read more
Disney’s Slack Data Breach: Lessons for Enterprise SaaS Security

Disney’s Slack Data Breach: Lessons for Enterprise SaaS Security

Recently, Disney was the target of a high-profile breach in which a hacker group was...

William Tran

Product Manager

Read more
Lessons from the Twilio Breach: Securing SaaS Applications Against Modern Threats

Lessons from the Twilio Breach: Securing SaaS Applications Against ...

Another recent security breach has made organizations think yet again about SaaS apps they may...

William Tran

Product Manager

Read more
Unpacking the CrowdStrike Outage: Causes, Impacts, and Protecting Your Business From Disaster.

Unpacking the CrowdStrike Outage: Causes, Impacts, and Protecting Y...

A major global IT outage occurred on Friday, July 19, 2024, causing widespread disruptions across...

William Tran

Product Manager

Read more
Best Google Drive™ Backup Solution

Best Google Drive™ Backup Solution

In today’s digital-first world, protecting your company’s data is crucial. If you’re like many businesses,...

William Tran

Product Manager

Read more
Mastering Disaster Recovery – Best Practices in 2024

Mastering Disaster Recovery – Best Practices in 2024

From natural calamities to cyber threats and system failures, organizations face numerous challenges that can...

William Tran

Product Manager

Read more
Protecting Your SaaS Environment: Insights from the Snowflake Incident

Protecting Your SaaS Environment: Insights from the Snowflake Incident

High-profile breaches are in the news more than ever before. However, data breaches are no...

William Tran

Product Manager

Read more
SSPM vs CSPM: Which Posture Management Solution is Right For You?

SSPM vs CSPM: Which Posture Management Solution is Right For You?

Cloud security posture management (CSPM) and SaaS security posture management (SSPM)  solutions are two separate,...

William Tran

Product Manager

Read more
The Leading Enterprise Level Backup Solutions of 2026

The Leading Enterprise Level Backup Solutions of 2026

As the volume of business data accelerates the demand for enterprise backup solutions has never...

William Tran

Product Manager

Read more
Top 5 SSPM (SaaS Security Posture Management) Vendors

Top 5 SSPM (SaaS Security Posture Management) Vendors

As businesses increasingly rely on Software as a Service (SaaS) applications for their daily operations,...

William Tran

Product Manager

Read more
Navigating Cloud Storage Changes in Education: Strategies for Cost Reduction and Data Management

Navigating Cloud Storage Changes in Education: Strategies for Cost ...

For a long time, Google and Microsoft have provided considerable benefits to educational institutions by...

William Tran

Product Manager

Read more
Defending Against SaaS Ransomware: Insights from the UnitedHealth Breach and Strategies for Enhanced Security

Defending Against SaaS Ransomware: Insights from the UnitedHealth B...

High-profile ransomware attacks are all too familiar in the news. No one is immune. Today’s...

William Tran

Product Manager

Read more
SpinBackup vs Backupify: A Comparison

SpinBackup vs Backupify: A Comparison

SpinBackup and Backupify are two backup solutions that offer advantages for data protection. SpinBackup helps...

William Tran

Product Manager

Read more
Key Takeaways: 2024 DCIG Report ‘Microsoft 365’s New Best Friend: AI-infused Data Protection Software’

Key Takeaways: 2024 DCIG Report ‘Microsoft 365’s New Be...

Data security has transitioned from a “nice to have” to arguably one of the top...

William Tran

Product Manager

Read more
What’s the Best Google Workspace™ Backup Solution?

What’s the Best Google Workspace™ Backup Solution?

In today’s digital age, businesses rely heavily on cloud-based services like Google Workspace™ (G Suite)...

William Tran

Product Manager

Read more
How to Restore A Backup From Google Drive™: A Step-by-Step Guide

How to Restore A Backup From Google Drive™: A Step-by-Step Guide

Article Summary: This article is a comprehensive guide to correctly restoring Google Drive™ backups after...

William Tran

Product Manager

Read more
Microsoft 365 Security: Features and Best Practices for Comprehensive Security and Enhanced Reliability

Microsoft 365 Security: Features and Best Practices for Comprehensi...

Microsoft 365 (M365), sometimes known as Microsoft Office 365 (O365), is a powerful cloud-based suite...

William Tran

Product Manager

Read more
What to Know About the New SEC Cybersecurity Disclosure Rules

What to Know About the New SEC Cybersecurity Disclosure Rules

The Securities and Exchange Commission (SEC) announced new additions to rules around disclosing cybersecurity risk...

William Tran

Product Manager

Read more
Cloud Security Posture Management (CSPM) Best Practices

Cloud Security Posture Management (CSPM) Best Practices

According to Gartner, by 2026, 60% of organizations will see preventing cloud misconfiguration as a...

William Tran

Product Manager

Read more
The Importance of Disaster Recovery Plans for Businesses

The Importance of Disaster Recovery Plans for Businesses

Cybersecurity events can disrupt business operations, have legal implications, cause financial and reputational, and even...

William Tran

Product Manager

Read more
What data can be backed up from Microsoft 365?

What data can be backed up from Microsoft 365?

Microsoft 365 services contain business-critical data. However, none of the services has an in-built backup...

William Tran

Product Manager

Read more
Why do you need C2C backups for your online business?

Why do you need C2C backups for your online business?

The amount of business-critical data stored in the cloud is increasing exponentially. So are the...

William Tran

Product Manager

Read more
Our Key Takeaways From Forrester’s SaaS Security Posture Management, Q4 2023 Report

Our Key Takeaways From Forrester’s SaaS Security Posture Manageme...

Renowned research and advisory firm Forrester has published The Forrester Wave(™): SaaS Security Posture Management,...

William Tran

Product Manager

Read more
SaaS Security Gaps CISOs Should Know

SaaS Security Gaps CISOs Should Know

With the many cybersecurity threats currently threatening businesses today and many more on the horizon,...

William Tran

Product Manager

Read more
Effective Steps to Take During a Cloud Ransomware Attack

Effective Steps to Take During a Cloud Ransomware Attack

In 2023 alone, 72% of companies were affected by ransomware, a significant increase compared to...

William Tran

Product Manager

Read more
How to Back Up Microsoft 365 Teams: Guide for Admins

How to Back Up Microsoft 365 Teams: Guide for Admins

Managing Microsoft 365 data is a key responsibility for IT admins—and Microsoft Teams is no...

William Tran

Product Manager

Read more
Recovery Time Actual in Cloud Office Suites: What SMBs Do Not Expect

Recovery Time Actual in Cloud Office Suites: What SMBs Do Not Expect

Companies that have disaster recovery strategies use a Recovery Time Objective to identify the downtime...

William Tran

Product Manager

Read more
How SMBs Can Enhance OneDrive Security

How SMBs Can Enhance OneDrive Security

Although it is not as popular as Google Workspace™ among SMBs, Microsoft 365 is a...

William Tran

Product Manager

Read more
Cloud Data Management: Best Practices for Businesses 2024

Cloud Data Management: Best Practices for Businesses 2024

Cloud data management is a relatively new phenomenon many companies struggle with. In this article,...

William Tran

Product Manager

Read more
Salesforce Data Recovery Tools and Tips for Admins

Salesforce Data Recovery Tools and Tips for Admins

Despite being well protected from external attacks, Salesforce bears hidden vulnerabilities when it comes to...

William Tran

Product Manager

Read more
How to Recover Deleted Gmail™ Account – A Complete Guide

How to Recover Deleted Gmail™ Account – A Complete Guide

Losing Google account data can be harmful to an SMB for a multitude of reasons....

William Tran

Product Manager

Read more
Google Workspace™ Malware Protection Best Practices

Google Workspace™ Malware Protection Best Practices

With 6M paid businesses and 2B active monthly users, Google Workspace™ is a popular target...

William Tran

Product Manager

Read more

Recognition