Michael Marriott

  • What Is Intellectual Property Protection?

    What Is Intellectual Property Protection?

    Growing costs of intellectual property theft Intellectual property theft is defined by the FBI as “robbing people or companies of ...

    Read Post
  • What is Third Party Risk?

    What is Third Party Risk?

    Third party risk is the process of managing risks introduced by suppliers and third parties, often specifically to sensitive data and customer information.

    Read Post
  • Data Leakage Detection Best Practices

    Data Leakage Detection Best Practices

    This blog provides an overview of our recently-published Data Leakage Detection Solutions guide, which provides best practices and free tools ...

    Read Post
  • Enhance Executive Protection with SocialMonitor

    Enhance Executive Protection with SocialMonitor

    Today we’re announcing the release of SocialMonitor, an industry-leading capability to better protect executives from social media impersonation. Read on ...

    Read Post
  • Protecting Against Ransomware: What Role Does Threat Intelligence Play?

    Protecting Against Ransomware: What Role Does Threat Intelligence Play?

    Ransomware actors are thriving at the moment: there is barely a day that goes by without the announcement of a ...

    Read Post
  • Social Media Monitoring Best Practices

    Social Media Monitoring Best Practices

    This blog is drawn from the Digital Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams ...

    Read Post
  • Understanding Smishing Attacks

    Understanding Smishing Attacks

    I’ve got some good news and some bad news.  The bad news is that I’ve been receiving a lot of ...

    Read Post
  • Getting Started With Domain Monitoring Part 3: Remediation

    Getting Started With Domain Monitoring Part 3: Remediation

    This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...

    Read Post
  • Getting Started with Domain Monitoring Part 2: Detection

    Getting Started with Domain Monitoring Part 2: Detection

    This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...

    Read Post
  • Getting Started with Domain Monitoring: Part 1, Collection

    Getting Started with Domain Monitoring: Part 1, Collection

    This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...

    Read Post
  • Key Findings from our Dark Web Monitoring Webinar

    Key Findings from our Dark Web Monitoring Webinar

    A few weeks ago, we hosted a webinar on Dark Web Monitoring. I was taken aback that, even a year ...

    Read Post
  • Cyber Threats to the Online Gaming Industry

    Cyber Threats to the Online Gaming Industry

    Last week, Motherboard reported that source code for FIFA 21 had been stolen from EA sports by hackers. This was ...

    Read Post
  • The Top Three Cybercrime Takeaways from the 2021 Verizon DBIR

    The Top Three Cybercrime Takeaways from the 2021 Verizon DBIR

    The 2021 DBIR is still hot off the press, and it did not disappoint. For many years, Verizon’s Data Breach ...

    Read Post
  • The Technology Adoption Lifecycle of Genesis Market

    The Technology Adoption Lifecycle of Genesis Market

    This blog highlights work from Digital Shadows’ recently-published Dark Web Monitoring Solutions Guide. The guide outlines some of the most ...

    Read Post
  • Tracking Ransomware within SearchLight

    Tracking Ransomware within SearchLight

    “If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful ...

    Read Post
  • 3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

    3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

    This blog outlines what you can expect to read in our newly-released Cyber Threat Intelligence: Solutions Guide and Best Practices. ...

    Read Post
  • Monitoring for Risks Coming From Suppliers: How SearchLight Helps

    Monitoring for Risks Coming From Suppliers: How SearchLight Helps

    For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released ...

    Read Post
  • How to Monitor Initial Access Broker Listings in SearchLight

    How to Monitor Initial Access Broker Listings in SearchLight

    By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome, ...

    Read Post
  • Threat Intelligence Can Be Noisy: SearchLight Helps

    Threat Intelligence Can Be Noisy: SearchLight Helps

    Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

    Read Post
  • Cybercriminals Targeting SAP RECON

    Cybercriminals Targeting SAP RECON

    Key takeaways From the discussions that rapidly emerged following the publication of CVE-2020-6287, we can learn the following: There is ...

    Read Post
  • loading
    Loading More...