Access the full report here: https://info.digitalshadows.com/2018ForresterWave-DigitalRiskProtection-Resources.html
Home
»
Attack Surface Reduction
»
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

×
Join 150k subscribers and get the latest news & threat intel in your inbox.
Thank you!
Error - something went wrong!
Other content in this Stream

Attack Surface Reduction
As your infrastructure grows and becomes more complex, it can be difficult to keep up with expanding attack surfaces. Attackers are aware of this and frequently look to exploit public-facing app...

A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

Detecting Infrastructure Weaknesses - Open Ports
See how a technology company prevented a possible ransomware infection.

Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files
The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents ...

Weekly Intelligence Summary: Ep 4
This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about...

ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

2019 Cyber Security Forecasts: Six Things on the Horizon
For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

Cybercriminals on the Outlook for Your Emails
In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

Blog | ICS Security: Strawmen In the Power Station
Congrats, it is now almost November and we have nearly made it through Cyber Security Awareness month (and what a ...

Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions
During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar
Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

Demystifying the Dark Web and Mitigating Risks
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.
The State of Cybercrime in the Post-AlphaBay and Hansa Age
Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

Escalation in Cyberspace: Not as Deniable as We All Seem to Think?