Attack Surface Reduction

Manage your attack surface and reduce the ways that an attacker can target your organization.

  • Attack Surface Reduction

    Attack Surface Reduction

    As your infrastructure grows and becomes more complex, it can be difficult to keep up with expanding attack surfaces. Attackers are aware of this and frequently look to exploit public-facing app...

    Read Report
  • Read Full Report
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Identify weak spots in your infrastructure

    Request a Demo
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • Cyber Threats to Energy Sector Mergers & Acquisitions

    Cyber Threats to Energy Sector Mergers & Acquisitions

    Read Report
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Episode 54: Marriott Breach And 2019 Trends

    Episode 54: Marriott Breach And 2019 Trends

    Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...

    Read Post
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Blog | ICS Security: Strawmen In the Power Station

    Blog | ICS Security: Strawmen In the Power Station

    Congrats, it is now almost November and we have nearly made it through Cyber Security Awareness month (and what a ...

    Read Post
  • Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions49:02

    Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions

    During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

    Watch Video
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar18:45

    The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar

    Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

    Watch Video
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

    Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

    The recent assassination attempt on former Russian spy Sergey Skripal has led to a deluge of cyber-based conspiracy theories within ...

    Read Post
  • FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar0:00

    FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar

    Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.

    Watch Video
  • Cyber Security as Public Health

    Cyber Security as Public Health

    Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s ...

    Read Post
  • Episode 27: Attribution: The How, The What and The Why

    Episode 27: Attribution: The How, The What and The Why

    Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances...

    Read Post
  • loading
    Loading More...