
Cybersecurity Executive Order Aims to Uplevel Protections Across Agencies
The Executive Order on Improving the Nation’s Cybersecurity takes aim at improving information sharing, supply chain security and tackling cyberthreats ... Read More

DHS Highlights Use of Social Media in Latest Terror Alert
According to DHS, social media and online forums are increasingly leveraged by threat actors to advance false narratives and promote violent ideologies ... Read More
Gathering Cyber Threat Intelligence on the Dark Web: Guidance for the Private Sector
Looking for guidance when gathering cyber threat intel on the Dark Web? Authentic8 highlights a memo from the Department of Justice Cybersecurity Unit ... Read More

OSINT OPSEC: Not just for government anymore
OSINT OPSEC is critical for any type of investigator to protect their mission, organization and themselves from cyber adversaries ... Read More

Better Intelligence, Better Anti-Money Laundering Compliance
FinCEN proposes new anti-money laundering compliance regulations to provide more useful information to law enforcement in BSA reports ... Read More

The Best Defense is Good OSINT
Malicious actors are utilizing publicly available data to identify vulnerabilities and penetrate government systems ... Read More

NSA warning on location data exposure: your web browser is a liability
The National Security Agency issued a warning that exposed location data from mobile devices can pose a security risk for government personnel ... Read More

CISA: Secure Your Web Browser, It’s Essential
The federal Cybersecurity and Infrastructure Security Agency (CISA) deems a secure web browser “essential” for business. What does that mean for you? ... Read More

CMMC: Still on Track?
The Cybersecurity Maturity Model Certification (CMMC) program is aiming to shore up cybersecurity among defense contractors. Is it still on track? An update ... Read More

5 Must-Reads for CMMC Insight
Reviewed: Resources that can help your company get a head start with CMMC, the Department of Defense's new contractor requirements. (Authentic8 Blog) ... Read More