Michael Marriott

  • The Technology Adoption Lifecycle of Genesis Market

    The Technology Adoption Lifecycle of Genesis Market

    This blog highlights work from Digital Shadows’ recently-published Dark Web Monitoring Solutions Guide. The guide outlines some of the most ...

    Read Post
  • Tracking Ransomware within SearchLight

    Tracking Ransomware within SearchLight

    “If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful ...

    Read Post
  • 3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

    3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

    This blog outlines what you can expect to read in our newly-released Cyber Threat Intelligence: Solutions Guide and Best Practices. ...

    Read Post
  • Monitoring for Risks Coming From Suppliers: How SearchLight Helps

    Monitoring for Risks Coming From Suppliers: How SearchLight Helps

    For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released ...

    Read Post
  • How to Monitor Initial Access Broker Listings in SearchLight

    How to Monitor Initial Access Broker Listings in SearchLight

    By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome, ...

    Read Post
  • Threat Intelligence Can Be Noisy: SearchLight Helps

    Threat Intelligence Can Be Noisy: SearchLight Helps

    Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

    Read Post
  • Cybercriminals Targeting SAP RECON

    Cybercriminals Targeting SAP RECON

    Key takeaways From the discussions that rapidly emerged following the publication of CVE-2020-6287, we can learn the following: There is ...

    Read Post
  • Four Ways to Validate Credentials in SearchLight

    Four Ways to Validate Credentials in SearchLight

    In this blog, I wanted to go into a little bit more detail to outline the four different options for credentials validation.

    Read Post
  • Access Keys Exposed: More Than 40% Are For Database Stores

    Access Keys Exposed: More Than 40% Are For Database Stores

    Over a 30-day period, we scanned more than 150 million entities from GitHub, GitLab, and Pastebin. During this time, our technology assessed and categorized almost 800,000 access keys and secrets.

    Read Post
  • Validate Exposed Credentials with Okta to Save Even More Time

    Validate Exposed Credentials with Okta to Save Even More Time

    SearchLight customers can now automatically validate credential alerts via an integration with Okta, drastically reducing the time required to triage.  ...

    Read Post
  • What is DevSecOps and Why Do We Need It?

    What is DevSecOps and Why Do We Need It?

    DevSecOps, SecDevOps, and any variation of those words are massively trending topics in tech companies today. People love to talk ...

    Read Post
  • The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit

    The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit

    Account takeover (ATO) has become a serious issue for many organizations. Digital Shadows has identified over 15 billion credentials circulating ...

    Read Post
  • SearchLight’s Credential Validation: Only Focus on What Matters

    SearchLight’s Credential Validation: Only Focus on What Matters

    Of the many use cases associated with threat intelligence and digital risk protection, monitoring for exposed credentials is always one ...

    Read Post
  • Tax Fraud in 2020: Down But Not Out

    Tax Fraud in 2020: Down But Not Out

    While it may seem that tax fraud is not as widely reported as in previous years, tax-related fraud continues to be a popular approach for cybercriminals.

    Read Post
  • Security Threat Intel Products and Services: Mapping SearchLight

    Security Threat Intel Products and Services: Mapping SearchLight

    Very few organizations have access to vast resources that will enable them to build out a ...

    Read Post
  • Asset Inventory Management: Difficult But Essential

    Asset Inventory Management: Difficult But Essential

    Asset inventories are one of the most important things to get right. Done correctly, they give you the best insight into your potential attack surface and identify where to focus your efforts.

    Read Post
  • Nemty Ransomware: Slow and Steady Wins the Race?

    Nemty Ransomware: Slow and Steady Wins the Race?

    As we outlined recently, ransomware is a key theme of the NCSC Cyber Trends Report: it’s a pervasive threat that ...

    Read Post
  • Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...

    Read Post
  • Managing Digital Risk: 4 Steps to Take

    Managing Digital Risk: 4 Steps to Take

    In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.

    Read Post
  • Partnering with SecureLink to help organizations minimize their digital risk

    Partnering with SecureLink to help organizations minimize their digital risk

    Today we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Digital ...

    Read Post
  • loading
    Loading More...