Digital Shadows Blogs

Manage Your Digital Risk

  • Security Analyst Spotlight Series: Rose Bernard

    Security Analyst Spotlight Series: Rose Bernard

    Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts ...

    Read Post
  • A New Approach for Channel Security Consultants

    A New Approach for Channel Security Consultants

    Old school security practices simply don’t fit the new IT environment.  Cloud computing, applications and distributed workforces have changed the ...

    Read Post
  • Shadow Talk Update – 05.21.2018

    Shadow Talk Update – 05.21.2018

    In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to ...

    Read Post
  • Patch Priorities: 10 Vulnerabilities You Should Pay Attention To

    Patch Priorities: 10 Vulnerabilities You Should Pay Attention To

    Not all vulnerabilities are created equal, and those that have been exploited by threat actors carry more weight. Last month, ...

    Read Post
  • Digital Shadows 7th Anniversary – A Look Back

    Digital Shadows 7th Anniversary – A Look Back

    Today marks the 7th anniversary of Digital Shadows. As James and I looked back on the year, we were amazed ...

    Read Post
  • Shadow Talk Update – 05.14.2018

    Shadow Talk Update – 05.14.2018

    In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We ...

    Read Post
  • Live Webinar: Demystifying the Dark Web and Mitigating Risks

    Live Webinar: Demystifying the Dark Web and Mitigating Risks

    Join us for an informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Read Post
  • Offsetting Dunbar by Developing Diversity

    Offsetting Dunbar by Developing Diversity

    Some of you may be familiar with the Dunbar Number, 150, being the maximum amount of relationships one individual can ...

    Read Post
  • Shadow Talk Update – 05.07.2018

    Shadow Talk Update – 05.07.2018

    In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 is ...

    Read Post
  • Security and Privacy: How to grow the relationship

    Security and Privacy: How to grow the relationship

    Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.

    Read Post
  • The Other Side of the Counter: DDoS, Social Engineering, Spambots and Insider Risks to Criminal Locations

    The Other Side of the Counter: DDoS, Social Engineering, Spambots and Insider Risks to Criminal Locations

    An enduring characteristic of dark web marketplaces is how frequently they’re offline, often through denial of services attacks. While marketplace ...

    Read Post
  • Shadow Talk Update – 04.30.2018

    Shadow Talk Update – 04.30.2018

    In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in ...

    Read Post
  • Digital Shadows Opens New State of the Art London Office in Canary Wharf

    Digital Shadows Opens New State of the Art London Office in Canary Wharf

    When myself and James Chappell set the company up six years ago at a kitchen table in Camden, London, we ...

    Read Post
  • Keys to the Kingdom: Exposed Security Assessments

    Keys to the Kingdom: Exposed Security Assessments

    Organizations employ external consultants and suppliers to perform assessments and penetration tests that help to bolster their overall internal security. ...

    Read Post
  • Shadow Talk Update – 04.23.2018

    Shadow Talk Update – 04.23.2018

    This week’s Shadow Talk discusses Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US ...

    Read Post
  • Out In The Open: Corporate Secrets Exposed Through Misconfigured Services

    Out In The Open: Corporate Secrets Exposed Through Misconfigured Services

    For organizations dealing with proprietary information or assets, one of the greatest concerns is the threat of competitors getting hold ...

    Read Post
  • When There’s No Need to Hack: Exposed Personal Information

    When There’s No Need to Hack: Exposed Personal Information

    With Equifax‘s breach of 145 million records still fresh in everyone’s memory and the recent Facebook data privacy controversy, protecting personal ...

    Read Post
  • Shadow Talk Update – 04.16.2018

    Shadow Talk Update – 04.16.2018

    This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered ...

    Read Post
  • Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

    Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

    The recent assassination attempt on former Russian spy Sergey Skripal has led to a deluge of cyber-based conspiracy theories within ...

    Read Post
  • Leveraging the 2018 Verizon Data Breach Investigations Report

    Leveraging the 2018 Verizon Data Breach Investigations Report

    Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...

    Read Post
  • loading
    Loading More...