New Splunk Integration for Threat Hunting, Other Online Research

New Splunk Integration for Threat Hunting, Other Online Research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an investigation audit trail and limit noise in SOC ...
Use the Dark Web to Enhance your Investigations - Learn How [Training Course]

Use the Dark Web to Enhance your Investigations – Learn How [Training Course]

The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations ...
Jake Williams: Combating Malware in 2020

Combating Malware in 2020: Process, Trends and Tools [Video]

Stay a step ahead of the adversaries planning their attack. The right framework prepares you, the latest data empowers you, and the right tools enable you ...
Social Media Account Discovery With Genymotion

Social Media Account Discovery With Genymotion

How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT researchers shows the steps ...
How to Use Pastebin for Cyber Threat Intelligence Research

How to Use Pastebin for Cyber Threat Intelligence Research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data ...
SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

Overlooked: “The Biggest Risk of All”

Global cybersecurity spending totals more than $100 billion p.a., with little effect. The Business Security Weekly podcast asked: Why? ...
Modern CTO Interview: Flipping Turtles

Modern CTO Interview: Flipping Turtles

Modern CTO podcast interview about web isolation and more with Kevin Lund, CTO and self-proclaimed “Turtle Flipper in Chief” at Authentic8 ...
Handbook: Tools, Tips & Tricks for Threat Hunters

Handbook: Tools, Tips & Tricks for Threat Hunters

Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft ...
Do Financial Crime Investigators Have a Bull’s Eye on their Back?

Do Financial Crime Investigators Have a Bull’s Eye on their Back?

Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission? ...
"Almost Like a Virtual Safe Room"

“Almost Like a Virtual Safe Room”

On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance ...