Our Latest Digital Risk Protection Resources, Tips, and Best Practices

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Weekly Intelligence Summary 13 Jun - 20 Jun 2019

    Weekly Intelligence Summary 13 Jun - 20 Jun 2019

    In the spotlight this week is a cyber-threat campaign involving the abuse of legitimate features in Google Calendar.

    Read Report
  • ×

    Live Webinar on
    June 27th:

    Best Practices Mitigating Risks to Data in Complex IT Ecosystems

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 June - Mitigating Risks to Data Webinar Session
    Thank you!
    Error - something went wrong!
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other...

    Read Post
  • Weekly Intelligence Summary

    Access Here
  • Managing Digital Risk: 4 Steps to Take

    Managing Digital Risk: 4 Steps to Take

    In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.

    Read Post
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Want To Try Out Our Digital Risk Protection Tool?

    Get Started Free
  • Managing Infosec Burnout: The Hidden Perpetrator

    Managing Infosec Burnout: The Hidden Perpetrator

    As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.

    Read Post
  • Leaky SMB File Shares – So Many Bytes!

    Leaky SMB File Shares – So Many Bytes!

    Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...

    Read Post
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...

    Read Post
  • Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study4:46

    Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study

    Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.

    Watch Video
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • Detecting Spoof Domains - Domain Infringement | Case Study

    Detecting Spoof Domains - Domain Infringement | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • ×

    Live Webinar
    July 18:

    Harnessing Exposed Data to Enhance Cyber Intelligence

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 July - Harnessing Exposed Data Webinar
    Thank you!
    Error - something went wrong!
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Detecting Exposed Credentials | Case Study

    Detecting Exposed Credentials | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Detecting Fake Social Media Profiles | Case Study

    Detecting Fake Social Media Profiles | Case Study

    See how a bank removed a spoof social media profiles targeting customers.

    Read Report
  • Detecting Infrastructure Weaknesses - Open Ports | Case Study

    Detecting Infrastructure Weaknesses - Open Ports | Case Study

    See how a technology company prevented a possible ransomware infection.

    Read Report
  • Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar50:58

    Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar

    The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting

    Watch Video
  • loading
    Loading More...