Our Latest Digital Risk Protection Resources, Tips, and Best Practices

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Weekly Intelligence Summary 11 Jul - 18 Jul 2019

    Weekly Intelligence Summary 11 Jul - 18 Jul 2019

    Entering the spotlight this week is the new “DoppelPaymer” ransomware, which bears resemblance to the “Indrik Spider”-associated “BitPaymer” ransomware.

    Read Report
  • ShadowTalk Update – Marriott Faces GDPR Fines, TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity

    ShadowTalk Update – Marriott Faces GDPR Fines, TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity

    Kacey and Alex join Harrison to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this ...

    Read Post
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Weekly Intelligence Summary

    Access Here
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Marriott Faces GDPR Fines - A DPO and CISO Discussion

    Marriott Faces GDPR Fines - A DPO and CISO Discussion

    Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week...

    Read Post
  • Want To Try Out Our Digital Risk Protection Tool?

    Get Started Free
  • Harnessing Exposed Data to Enhance Cyber Intelligence

    Harnessing Exposed Data to Enhance Cyber Intelligence

    We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz

    Read Post
  • Managing Digital Risk: 4 Steps to Take

    Managing Digital Risk: 4 Steps to Take

    In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.

    Read Post
  • ×

    150k+ subscribers stay ahead of digital risks.

    - Join Them -

    Sign up for threat intel and security news updates here:

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see

    Read Post
  • Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...

    Read Post
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • Interview With Deputy CISO At Accenture, Jason Lewkowicz

    Interview With Deputy CISO At Accenture, Jason Lewkowicz

    Harrison interviews Deputy CISO at Accenture, Jason Lewkowicz, and CISO at Digital Shadows, Rick Holland. The group discusses the importance of working functionally as a security team, cyber...

    Read Post
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar55:16

    Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar

    Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data,

    Watch Video
  • Managing Infosec Burnout: The Hidden Perpetrator

    Managing Infosec Burnout: The Hidden Perpetrator

    As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.

    Read Post
  • Leaky SMB File Shares – So Many Bytes!

    Leaky SMB File Shares – So Many Bytes!

    Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...

    Read Post
  • Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...

    Read Post
  • Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study4:46

    Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study

    Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.

    Watch Video
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • Detecting Spoof Domains - Domain Infringement | Case Study

    Detecting Spoof Domains - Domain Infringement | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • loading
    Loading More...