Cyber Threat Intelligence: Lack of Training, Tools, Oversight

Cyber Threat Intelligence: Lack of Training, Tools, Oversight

New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization: ... Read More
The Next Evolution of Cyber Threat Intelligence

What’s Next in Cyber Threat Intelligence?

Video: Jake Williams (SANS & Rendition InfoSec) shares his thoughts about the future of Cyber Threat Intelligence (CTI) and OSINT collection. (Authentic8) ... Read More
How to Use OSINT for Cyber Threat Intelligence Investigations

Cyber Threat Intelligence: How to Use OSINT

Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What's the recommended playbook? ... Read More
How to Use OSINT for Cyber Threat Intelligence Investigations

How OSINT Benefits Cyber Threat Intelligence

We asked cyber threat intelligence veteran Jake Williams, SANS instructor and president/founder of Rendition Infosec, in this video. (Authentic8 Blog) ... Read More
Web Isolation with Authentic8 & Silo at RSA 2020

Web Isolation with Authentic8 & Silo at RSA 2020

This year's RSA conference in San Francisco offers various opportunities to meet Authentic8 (booth #2264) and learn about its Silo web isolation platform ... Read More
Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone

Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone

Authentic8, maker of Silo, the leading web isolation platform for commercial and government organizations, is now 'In Process' for FedRAMP authorization ... Read More
To TOR or Not to TOR?

To TOR or Not to TOR?

Online forums accessible only through the TOR network serve as dissemination points for manifestos celebrating and inspiring terrorist attacks ... Read More
The Silo Sessions # 19: Monsters, Middleboxes, and the Browser

Interview: HTTPS Interception, TLS Fingerprinting, and the Browser

In episode # 19 of Authentic8's Silo Sessions podcast, Luke Valenta and Gabriele Fisher (both Cloudflare) discuss detecting HTTPS interception with their MITMEngine tool and the MALCOLM dashboard ... Read More
How to Conduct Social Media Investigations and Remain Anonymous

How to Conduct Social Media Investigations and Remain Anonymous

How can investigators conduct research on social media without exposing their organization? Tradecraft tips and tool recommendations from an OSINT training specialist and former intelligence analyst ... Read More
The Silo Sessions #16: GDPR Outlook w/ Scott Petry & Steve Durbin

GDPR Outlook: After First Record Fines, What’s Next?

Authentic8's CEO Scott Petry and Steve Durbin (ISF) discuss record fines, how Brexit may impact GDPR enforcement, and why apps and tools that touch EU employee data face increased scrutiny ... Read More