Modern CTO Interview: Flipping Turtles

Modern CTO Interview: Flipping Turtles

Modern CTO podcast interview about web isolation and more with Kevin Lund, CTO and self-proclaimed “Turtle Flipper in Chief” at Authentic8 ... Read More
The Billion-Dollar Security Blanket: A Feelgood Fallacy

The Billion-Dollar Security Blanket: A Feelgood Fallacy

Global cybersecurity spending is approaching $200 billion per year. Authentic8's Matt Ashburn (formerly CIA & White House) asks: Does it make a difference? ... Read More
Handbook: Tools, Tips & Tricks for Threat Hunters

Handbook: Tools, Tips & Tricks for Threat Hunters

Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft ... Read More
"Almost Like a Virtual Safe Room"

“Almost Like a Virtual Safe Room”

On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance ... Read More
Extending the Zero Trust Framework to Unmanaged Devices

“Remote Work Requires Security Strategy Adjustment”

Remote work requires adjustments to ITsec strategies, says Forrester's Chase Cunningham. How to expand the Zero Trust framework to unmanaged devices? ... Read More
Meet Us at the FS-ISAC Virtual Summit May 19-20

Meet Us at the FS-ISAC Virtual Summit May 19-20

FS-ISAC Virtual Summit, Authentic8 virtual booth - May 19-20: Meet the team behind Silo for Research (Toolbox) and Silo for Safe Access (Cloud Browser) ... Read More
Webinar: Zero Trust and Unmanaged Devices

Webinar: Zero Trust and Unmanaged Devices

Authentic8’s co-founder / President Ramesh Rajagopal and Forrester VP / Principal Analyst Chase Cunningham on Zero Trust frameworks and unmanaged devices ... Read More
Cyber Threat Intelligence: Lack of Training, Tools, Oversight

Cyber Threat Intelligence: Lack of Training, Tools, Oversight

New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization: ... Read More
The Next Evolution of Cyber Threat Intelligence

What’s Next in Cyber Threat Intelligence?

Video: Jake Williams (SANS & Rendition InfoSec) shares his thoughts about the future of Cyber Threat Intelligence (CTI) and OSINT collection. (Authentic8) ... Read More
How to Use OSINT for Cyber Threat Intelligence Investigations

Cyber Threat Intelligence: How to Use OSINT

Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What's the recommended playbook? ... Read More

Secure Guardrails