Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks

    SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks

    Since founding the company in 2011, we’ve had some memorable milestones: from the first release of SearchLight in 2014, to ...

    Read Post
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Breach! Exploring The Modern Digital Breach With Cyber Defense Lab’s CEO Bob Anderson - Part 1

    Breach! Exploring The Modern Digital Breach With Cyber Defense Lab’s CEO Bob Anderson - Part 1

    It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where...

    Read Post
  • Fresh blow for dark web markets: Nightmare market in disarray

    Fresh blow for dark web markets: Nightmare market in disarray

    Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several ...

    Read Post
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Weekly Intelligence Summary

    Access Here
  • Weekly Intelligence Summary 08 Aug - 15 Aug 2019

    Weekly Intelligence Summary 08 Aug - 15 Aug 2019

    In the spotlight this week are details of ongoing sextortion campaigns which consistently use unsophisticated tactics and techniques to target users indiscriminately.

    Read Report
  • Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp

    Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp

    Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story...

    Read Post
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • The Account Takeover Kill Chain: A Five Step Analysis

    The Account Takeover Kill Chain: A Five Step Analysis

    Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?

    Read Post
  • ×

    150k+ subscribers stay ahead of digital risks.

    - Join Them -

    Sign up for threat intel and security updates:

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • WTF is Digital Risk Protection

    WTF is Digital Risk Protection

    A quick guide to understanding how your company looks to attackers.

    Read Report
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • ×

    Live Webinar w/ FBI Cyber Division
    Aug 28:

    Your Data at Risk

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 August - Your Data at Risk Webinar
    Thank you!
    Error - something went wrong!
  • Detecting Spoof Domains - Domain Infringement | Case Study

    Detecting Spoof Domains - Domain Infringement | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Harnessing Exposed Data to Enhance Cyber Intelligence

    Harnessing Exposed Data to Enhance Cyber Intelligence

    We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz

    Read Post
  • Managing Digital Risk: 4 Steps to Take

    Managing Digital Risk: 4 Steps to Take

    In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.

    Read Post
  • Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...

    Read Post
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar55:16

    Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar

    Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data,

    Watch Video
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • Detecting Exposed Credentials | Case Study

    Detecting Exposed Credentials | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • loading
    Loading More...