Digital Shadows Resources Center

Welcome to our Digital Risk and Threat Intelligence Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • ×

    Live Webinar w/
    FBI Cyber Squad:

    Surging Cyber Threats to Watch in 2019

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2018 December - FBI 2019 Predictions - Webinar Session
    Thank you!
    Error - something went wrong!
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Episode 54: Marriott Breach And 2019 Trends

    Episode 54: Marriott Breach And 2019 Trends

    Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...

    Read Post
  • Test Drive SearchLight™ Free

    Get Started Now
  • Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

    Read Report
  • Sextortion 2.0: A New Lure

    Sextortion 2.0: A New Lure

    Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. ...

    Read Post
  • Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set ...

    Read Post
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • Digital Shadows Overview

    Digital Shadows Overview

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.

    Read Report
  • 5 Ways Cybercriminals Can Access Your Emails Without Phishing

    5 Ways Cybercriminals Can Access Your Emails Without Phishing

    Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

    Read Report
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Bank Discovers Customer Credit Card Numbers Traded Online

    Bank Discovers Customer Credit Card Numbers Traded Online

    Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, ...

    Read Post
  • Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions49:02

    Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions

    During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

    Watch Video
  • How ADP Manages 3rd Party & Supply Chain Risk57:25

    How ADP Manages 3rd Party & Supply Chain Risk

    Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.

    Watch Video
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Phishing Site Impersonates Financial Services Institution

    Phishing Site Impersonates Financial Services Institution

    If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

    Read Post
  • 10 Things You Didn’t Know You Could Do with Shadow Search™

    10 Things You Didn’t Know You Could Do with Shadow Search™

    You may have seen that we’ve recently released Shadow Search, a new tool that gives you immediate access to both ...

    Read Post
  • Airline Discovers Trove of Frequent Flyer Accounts Compromised and Posted for Sale Online

    Airline Discovers Trove of Frequent Flyer Accounts Compromised and Posted for Sale Online

    Reward program fraud has been rising in recent years across the aviation industry as well as the entire transportation sector. ...

    Read Post
  • loading
    Loading More...