Modern CTO Interview: Flipping Turtles
Modern CTO podcast interview about web isolation and more with Kevin Lund, CTO and self-proclaimed “Turtle Flipper in Chief” at Authentic8 ... Read More
The Billion-Dollar Security Blanket: A Feelgood Fallacy
Global cybersecurity spending is approaching $200 billion per year. Authentic8's Matt Ashburn (formerly CIA & White House) asks: Does it make a difference? ... Read More
Handbook: Tools, Tips & Tricks for Threat Hunters
Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft ... Read More
“Almost Like a Virtual Safe Room”
On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance ... Read More
“Remote Work Requires Security Strategy Adjustment”
Remote work requires adjustments to ITsec strategies, says Forrester's Chase Cunningham. How to expand the Zero Trust framework to unmanaged devices? ... Read More
Meet Us at the FS-ISAC Virtual Summit May 19-20
FS-ISAC Virtual Summit, Authentic8 virtual booth - May 19-20: Meet the team behind Silo for Research (Toolbox) and Silo for Safe Access (Cloud Browser) ... Read More
Webinar: Zero Trust and Unmanaged Devices
Authentic8’s co-founder / President Ramesh Rajagopal and Forrester VP / Principal Analyst Chase Cunningham on Zero Trust frameworks and unmanaged devices ... Read More
Cyber Threat Intelligence: Lack of Training, Tools, Oversight
New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization: ... Read More
What’s Next in Cyber Threat Intelligence?
Video: Jake Williams (SANS & Rendition InfoSec) shares his thoughts about the future of Cyber Threat Intelligence (CTI) and OSINT collection. (Authentic8) ... Read More
Cyber Threat Intelligence: How to Use OSINT
Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What's the recommended playbook? ... Read More