Michael Marriott

  • Recruitment Fraud in 2022

    Recruitment Fraud in 2022

    Earlier this month, the FBI released a public service announcement titled “Scammers Exploit Security Weaknesses on Job Recruitment Websites to ...

    Read Post
  • Vulnerability Intelligence: A Best Practice Guide

    Vulnerability Intelligence: A Best Practice Guide

    Vulnerability intelligence is fast emerging as one of the most valued threat intelligence use cases. It provides information about how ...

    Read Post
  • Cyber Threats to Government

    Cyber Threats to Government

    Exploring cyber threats to Government and Public bodies, including ransomware targets and initial access listings

    Read Post
  • Managing your External Attack Surface with SearchLight

    Managing your External Attack Surface with SearchLight

    Recently we have been hearing plenty about External Attack Surface Management (EASM). While Digital Shadows focuses on digital risk protection ...

    Read Post
  • What Is Intellectual Property Protection?

    What Is Intellectual Property Protection?

    Growing costs of intellectual property theft Intellectual property theft is defined by the FBI as “robbing people or companies of ...

    Read Post
  • What is Third Party Risk?

    What is Third Party Risk?

    Third party risk is the process of managing risks introduced by suppliers and third parties, often specifically to sensitive data and customer information.

    Read Post
  • Data Leakage Detection Best Practices

    Data Leakage Detection Best Practices

    This blog provides an overview of our recently-published Data Leakage Detection Solutions guide, which provides best practices and free tools ...

    Read Post
  • Enhance Executive Protection with SocialMonitor

    Enhance Executive Protection with SocialMonitor

    Today we’re announcing the release of SocialMonitor, an industry-leading capability to better protect executives from social media impersonation. Read on ...

    Read Post
  • Protecting Against Ransomware: What Role Does Threat Intelligence Play?

    Protecting Against Ransomware: What Role Does Threat Intelligence Play?

    Ransomware actors are thriving at the moment: there is barely a day that goes by without the announcement of a ...

    Read Post
  • Social Media Monitoring Best Practices

    Social Media Monitoring Best Practices

    This blog is drawn from the Digital Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams ...

    Read Post
  • Understanding Smishing Attacks

    Understanding Smishing Attacks

    I’ve got some good news and some bad news.  The bad news is that I’ve been receiving a lot of ...

    Read Post
  • Getting Started With Domain Monitoring Part 3: Remediation

    Getting Started With Domain Monitoring Part 3: Remediation

    This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...

    Read Post
  • Getting Started with Domain Monitoring Part 2: Detection

    Getting Started with Domain Monitoring Part 2: Detection

    This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...

    Read Post
  • Getting Started with Domain Monitoring: Part 1, Collection

    Getting Started with Domain Monitoring: Part 1, Collection

    This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...

    Read Post
  • Key Findings from our Dark Web Monitoring Webinar

    Key Findings from our Dark Web Monitoring Webinar

    A few weeks ago, we hosted a webinar on Dark Web Monitoring. I was taken aback that, even a year ...

    Read Post
  • Cyber Threats to the Online Gaming Industry

    Cyber Threats to the Online Gaming Industry

    Last week, Motherboard reported that source code for FIFA 21 had been stolen from EA sports by hackers. This was ...

    Read Post
  • The Top Three Cybercrime Takeaways from the 2021 Verizon DBIR

    The Top Three Cybercrime Takeaways from the 2021 Verizon DBIR

    The 2021 DBIR is still hot off the press, and it did not disappoint. For many years, Verizon’s Data Breach ...

    Read Post
  • The Technology Adoption Lifecycle of Genesis Market

    The Technology Adoption Lifecycle of Genesis Market

    This blog highlights work from Digital Shadows’ recently-published Dark Web Monitoring Solutions Guide. The guide outlines some of the most ...

    Read Post
  • Tracking Ransomware within SearchLight

    Tracking Ransomware within SearchLight

    “If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful ...

    Read Post
  • 3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

    3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

    This blog outlines what you can expect to read in our newly-released Cyber Threat Intelligence: Solutions Guide and Best Practices. ...

    Read Post
  • loading
    Loading More...