OSINT Tip: How to Analyze Exif Data

OSINT Tip: How to Analyze Exif Data

Image metadata analysis enables analysts, investigators, and journalists to gather insights about people, events, and locations worldwide. How does it work? ... Read More
OSINT Live Training by Authentic8 30 APR: SHODAN

Quick Guide: How to Use Shodan

As a cybersecurity professional, are you familiar with Shodan and how to use it? Check out this quick guide for IT security teams and threat hunters ... Read More
IT, Legal, Compliance: We Need to Talk.

IT, Legal, Compliance: We Need to Talk.

IT, compliance, and legal teams see online risks with different eyes. How does that impact the regulatory and cybersecurity posture of financial firms? ... Read More
2019 in Review: Data Breach Statistics and Trends

2019 in Review: Data Breach Statistics and Trends

What were the most significant data breaches in 2019? Will ransomware still be a threat in 2020? (Spoiler alert: It’s forecast to be worse than ever.) Which industries were attacked most?*We have put together a shortlist of overview articles, surveys, and posts worth returning to for use as ... Read More
Scott Petry - Triangulation 423

Ideas That Become Obvious In Hindsight

Award-winning tech journalist Leo Laporte's interview with Scott Petry, Co-founder and CEO of Authentic8, maker of the Silo Cloud Browser ... Read More
What’s the ROI of Threat Hunting?

What’s the ROI of Threat Hunting?

The answer may lie in a strategy and tool selection that avoids mission and cost creep, and results in measurable effects - and savings - to prove it ... Read More
October Is Malvertising Awareness Month

October Is Malvertising Awareness Month

Malvertising campaigns have pushed more than a billion malware and spam-laden ads through online advertising networks onto "secure" web browsers. Why ad-blocking software failed to stem the tide ... Read More
Showdown: VPN vs. Cloud Browser

Showdown: VPN vs. Cloud Browser

In many companies, VPN has become a staple of the traditional IT security stack. Annually, mid-sized organizations (<5,000 employees) spend an average of $60 per user on VPN technology and maintenance. Not much longer though, it seems. While VPN has been around for more than 20 years, it ... Read More
85% of Infected Websites Are NOT Blacklisted

85% of Infected Websites Are NOT Blacklisted

Website attacks increased by 59% in 2018, according to the 2019 Website Security Report [PDF] recently published by Scottsdale, AZ-based SiteLock, a provider of business website security solutions. Most of the attacks were automated, the company reports, with 330 bots staging on average 62 attacks per day. So far, so ... Read More
81% of CIOs and CISOs Defer Critical Updates or Patches

81% of CIOs and CISOs Defer Critical Updates or Patches

New research indicates that eight out of ten CIOs and CISOs refrain from adopting an important security update or patch, due to concerns about the impact it might have on business operations. * More than half (52%) said they have done so on more than one occasion. What about in ... Read More