Data Loss Detection

Reduce the amount of information available for reconnaissance or corporate espionage.

  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Weekly Intelligence Summary

    Access Here
  • Data Leakage Detection

    Data Leakage Detection

    Detect sensitive data that's been exposed by employees, contractors, or third parties.

    Read Report
  • Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp

    Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp

    Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story...

    Read Post
  • Detecting Exposed Credentials | Case Study

    Detecting Exposed Credentials | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • Harnessing Exposed Data to Enhance Cyber Intelligence

    Harnessing Exposed Data to Enhance Cyber Intelligence

    We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz

    Read Post
  • Weekly Intelligence Summary 08 Aug - 15 Aug 2019

    Weekly Intelligence Summary 08 Aug - 15 Aug 2019

    In the spotlight this week are details of ongoing sextortion campaigns which consistently use unsophisticated tactics and techniques to target users indiscriminately.

    Read Report
  • ×

    150k+ subscribers stay ahead of digital risks.

    - Join Them -

    Sign up for threat intel and security updates:

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Marriott Faces GDPR Fines - A DPO and CISO Discussion

    Marriott Faces GDPR Fines - A DPO and CISO Discussion

    Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week...

    Read Post
  • Data Loss Detection Overview

    Data Loss Detection Overview

    SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data

    Read Report
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • Weekly Intelligence Summary 18 Jul - 25 Jul 2019

    Weekly Intelligence Summary 18 Jul - 25 Jul 2019

    Read Report
  • 2.3 billion files exposed across online file storage technologies

    2.3 billion files exposed across online file storage technologies

    Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer

    Read Post
  • ×

    Live Webinar w/ FBI Cyber Division
    Aug 28:

    Your Data at Risk

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 August - Your Data at Risk Webinar
    Thank you!
    Error - something went wrong!
  • Detecting Exposed Company Data: The What, Why, and How

    Detecting Exposed Company Data: The What, Why, and How

    What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...

    Read Post
  • Leaky SMB File Shares – So Many Bytes!

    Leaky SMB File Shares – So Many Bytes!

    Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...

    Read Post
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • SingHealth Breach Post-mortem: Key Findings

    SingHealth Breach Post-mortem: Key Findings

    On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare ...

    Read Post
  • Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

    Read Report
  • Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...

    Read Post
  • loading
    Loading More...