chat
expand_more

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
August 31, 2022

Zehan Wang has had an impressive career. Now a UK-based angel investor, Zehan was previously co-founder and CTO of Magic Pony, a machine learning startup acquired by Twitter within just two years of founding.

Recently, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sat down with Zehan to chat about his remarkable journey as an engineering leader. In part one of the episode, David and Zehan explored how Zehan started his career in tech, his entrepreneurship, the founding of Magic Pony, and how Twitter came to acquire the company.

In part two, David and Zehan delve into Zehan’s experience as an angel investor in the UK. They discuss:

  • How to intelligently select investments

  • The importance of people management

  • Choosing a startup as a job seeker and as an investor

  • Establishing equity at a startup

We hope you enjoy it! Don’t forget to subscribe to Abnormal Engineering Stories on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #11: Examining the UK Startup Ecosystem, Part 2

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More