Attack Surface Reduction

Manage your attack surface and reduce the ways that an attacker can target your organization.

  • Reducing Your Attack Surface

    Reducing Your Attack Surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • Read Full Report
  • ×

    Live Webinar on
    June 27th:

    Best Practices Mitigating Risks to Data in Complex IT Ecosystems

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 June - Mitigating Risks to Data Webinar Session
    Thank you!
    Error - something went wrong!
  • Detecting Infrastructure Weaknesses - Open Ports | Case Study

    Detecting Infrastructure Weaknesses - Open Ports | Case Study

    See how a technology company prevented a possible ransomware infection.

    Read Report
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Identify weak spots in your infrastructure

    Request a Demo
  • Episode 46: Supply Chain and Third-Party Risks

    Episode 46: Supply Chain and Third-Party Risks

    Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so...

    Read Post
  • How to Reduce Your Attack Surface with Digital Shadows SearchLight™1:20

    How to Reduce Your Attack Surface with Digital Shadows SearchLight™

    Manage your attack surface and reduce the ways that an attacker can target your organization. SearchLight continually monitors for exploited vulnerabilities on your infrastructure, weak or expiring ce

    Watch Video
  • Attack Surface Reduction Overview

    Attack Surface Reduction Overview

    As your infrastructure grows and becomes more complex, it can be difficult to keep up with expanding attack surfaces. Attackers are aware of this and frequently look to exploit public-facing app...

    Read Report
  • Weekly Intelligence Summary 06 Jun - 13 Jun 2019

    Weekly Intelligence Summary 06 Jun - 13 Jun 2019

    An indiscriminate malicious cryptocurrency campaign is targeting entities in China using fileless malware techniques, readily available PowerShell exploit tools, and variants of the open-source crypto

    Read Report
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...

    Read Post
  • Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

    Read Report
  • Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

    Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

    The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents ...

    Read Post
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Cyber Threats to Energy Sector Mergers & Acquisitions

    Cyber Threats to Energy Sector Mergers & Acquisitions

    Learn about the top cyber threats to the energy sector within mergers & acquisitions.

    Read Report
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Blog | ICS Security: Strawmen In the Power Station

    Blog | ICS Security: Strawmen In the Power Station

    Congrats, it is now almost November and we have nearly made it through Cyber Security Awareness month (and what a ...

    Read Post
  • Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions49:02

    Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions

    During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

    Watch Video
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar18:45

    The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar

    Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

    Watch Video
  • loading
    Loading More...