Access the full report here: https://info.digitalshadows.com/2018ForresterWave-DigitalRiskProtection-Resources.html
Home » Attack Surface Reduction » Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture
7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digi...
Error - something went wrong!
Other content in this Stream
Reducing Your Attack Surface
What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...
Detecting Infrastructure Weaknesses - Open Ports | Case Study
See how a technology company prevented a possible ransomware infection.
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
Episode 46: Supply Chain and Third-Party Risks
Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so...
How to Reduce Your Attack Surface with Digital Shadows SearchLight™
Manage your attack surface and reduce the ways that an attacker can target your organization. SearchLight continually monitors for exploited vulnerabilities on your infrastructure, weak or expiring ce
Attack Surface Reduction Overview
As your infrastructure grows and becomes more complex, it can be difficult to keep up with expanding attack surfaces. Attackers are aware of this and frequently look to exploit public-facing app...
Weekly Intelligence Summary 04 Jul - 11 Jul 2019
Two previously unseen malware variants have been attributed to the financially motivated “TA505” in attacks on various organizations worldwide, even as the threat group continues to rely on commonly u
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Operation Soft Cell, Libra Cryptocurrency Impersonations, and New Cyber Espionage Activity
This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications organizations since early 2017. Other highlights from the...
Extortion Exposed: Sextortion, thedarkoverlord, and SamSam
In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...
Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.
Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files
The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents ...
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Cyber Threats to Energy Sector Mergers & Acquisitions
Learn about the top cyber threats to the energy sector within mergers & acquisitions.
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
Cybercriminals on the Outlook for Your Emails
In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
Blog | ICS Security: Strawmen In the Power Station
Congrats, it is now almost November and we have nearly made it through Cyber Security Awareness month (and what a ...
Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions