A8 Team

How to Use Pastebin for Cyber Threat Intelligence Research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are…

4 months ago

Overlooked: “The Biggest Risk of All”

Global cybersecurity spending totals more than $100 billion p.a., with little effect. The Business Security Weekly podcast asked: Why?

4 months ago

Modern CTO Interview: Flipping Turtles

Modern CTO podcast interview about web isolation and more with Kevin Lund, CTO and self-proclaimed “Turtle Flipper in Chief” at…

5 months ago

The Billion-Dollar Security Blanket: A Feelgood Fallacy

Global cybersecurity spending is approaching $200 billion per year. Authentic8's Matt Ashburn (formerly CIA & White House) asks: Does it…

5 months ago

Handbook: Tools, Tips & Tricks for Threat Hunters

Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their…

5 months ago

“Almost Like a Virtual Safe Room”

On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance

5 months ago

“Remote Work Requires Security Strategy Adjustment”

Remote work requires adjustments to ITsec strategies, says Forrester's Chase Cunningham. How to expand the Zero Trust framework to unmanaged…

7 months ago

Meet Us at the FS-ISAC Virtual Summit May 19-20

FS-ISAC Virtual Summit, Authentic8 virtual booth - May 19-20: Meet the team behind Silo for Research (Toolbox) and Silo for…

7 months ago

Webinar: Zero Trust and Unmanaged Devices

Authentic8’s co-founder / President Ramesh Rajagopal and Forrester VP / Principal Analyst Chase Cunningham on Zero Trust frameworks and unmanaged…

9 months ago

Cyber Threat Intelligence: Lack of Training, Tools, Oversight

New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without…

9 months ago