Election Security: Defending our Democracy against Well-Resourced Adversaries

Protecting Against Election Interference in 2024

While the 2020 election is still hot on everyone’s mind, let’s look ahead changes we can make now to limit election interference in the future ... Read More
Financial Fraud Investigation Tools: Tips and Techniques Handbook Now Available

Financial Fraud Investigation Tools: Tips and Techniques Handbook Now Available

The handbook compiles guidance from financial crime and AML experts plus practical advice on navigating the dark web for financial fraud investigations ... Read More
From the Experts: Social Media Monitoring and Dark Web Investigations

From the Experts: Social Media Monitoring and Dark Web Investigations

Two cybersecurity veterans discuss why not just government agencies need to securely investigate threats via social media and the dark web ... Read More
Brian Kime - Threat Intelligence Clip

Practice Safe SECs: Cyber intelligence experts on building safe operational security and information security practices

Two cybersecurity veterans from Authentic8 and Forrester share real-life stories from their tenures in public and private sector organizations ... Read More
Election Security: Defending our Democracy against Well-Resourced Adversaries

ON-DEMAND Webinar: Election Security: Defending our Democracy against Well-Resourced Adversaries [Video]

Adversaries have an interest in influencing the U.S. electoral process. What happens in America impacts the political and economic climate around the world ... Read More
Use the Dark Web to Enhance your Investigations - Learn How [Training Course]

Use the Dark Web to Enhance your Investigations – Learn How [Training Course]

The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations ... Read More
Jake Williams: Combating Malware in 2020

Combating Malware in 2020: Process, Trends and Tools [Video]

Stay a step ahead of the adversaries planning their attack. The right framework prepares you, the latest data empowers you, and the right tools enable you ... Read More
Social Media Account Discovery With Genymotion

Social Media Account Discovery With Genymotion

How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT researchers shows the steps ... Read More
How to Use Pastebin for Cyber Threat Intelligence Research

How to Use Pastebin for Cyber Threat Intelligence Research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data ... Read More
SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

Overlooked: “The Biggest Risk of All”

Global cybersecurity spending totals more than $100 billion p.a., with little effect. The Business Security Weekly podcast asked: Why? ... Read More