Cloud Browser

Handbook: Tools, Tips & Tricks for Threat Hunters
Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft ...

Do Financial Crime Investigators Have a Bull’s Eye on their Back?
Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission? ...

“Almost Like a Virtual Safe Room”
On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance ...

Is My Data for Sale on the Dark Web?
Is your company's corporate network access for sale, too? Find out now. New research shows: remote work vulnerabilities have dark web marketplaces booming ...

Meet Us at the FS-ISAC Virtual Summit May 19-20
FS-ISAC Virtual Summit, Authentic8 virtual booth - May 19-20: Meet the team behind Silo for Research (Toolbox) and Silo for Safe Access (Cloud Browser) ...

Zero Trust Implementations: Are You Still Too Trusting?
Using the Silo Web Isolation Platform to implement a device and location independent security architecture. (Ramesh Rajagopal, Authentic8) ...

Sheltered-in-Place With Old Bessie
That old desktop or laptop that you never got around to throwing out at the last e-waste event? Breathe new life into it, for remote work and e-learning ...

Cyber Threat Intelligence: How to Use OSINT
Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What's the recommended playbook? ...

Web Isolation with Authentic8 & Silo at RSA 2020
This year's RSA conference in San Francisco offers various opportunities to meet Authentic8 (booth #2264) and learn about its Silo web isolation platform ...

2019 – the Year of Fake Security
Record data breaches and a new survey indicate that cybersecurity snake oil peddlers had a ball last year, writes Authentic8 Co-founder and CEO Scott Petry ...