Digital Shadows Resources Center

Welcome to our Digital Risk and Threat Intelligence Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Security Analyst Spotlight Series: Rose Bernard5:59

    Security Analyst Spotlight Series: Rose Bernard

    In this series, we bring our analysts out of the shadows and into the spotlight, showcasing their expertise & interests so you can learn about a “day-in-the-life” of a Digital Shadows analyst.

    Watch Video
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • Digital Shadows Overview

    Digital Shadows Overview

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.

    Read Report
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • Patch Priorities: 10 Vulnerabilities You Should Pay Attention To

    Patch Priorities: 10 Vulnerabilities You Should Pay Attention To

    Not all vulnerabilities are created equal, and those that have been exploited by threat actors carry more weight. Last month, ...

    Read Post
  • Subscribe to Shadow Talk Podcast on iTunes!

    Click Here
  • Digital Shadows 7th Anniversary – A Look Back

    Digital Shadows 7th Anniversary – A Look Back

    Today marks the 7th anniversary of Digital Shadows. As James and I looked back on the year, we were amazed ...

    Read Post
  • Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

    Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

    In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerability affecting Open PGP and S-MIME, as well as...

    Read Post
  • ×

    Request a Free
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Security and Privacy: How to grow the relationship

    Security and Privacy: How to grow the relationship

    Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.

    Read Post
  • Introducing Shadow Search for Digital Shadows SearchLight™

    Introducing Shadow Search for Digital Shadows SearchLight™

    Introducing Shadow Search - Quickly enable deeper research and investigation.

    Read Report
  • GDPR Resources
  • Digital Shadows Opens New State of the Art London Office in Canary Wharf

    Digital Shadows Opens New State of the Art London Office in Canary Wharf

    When myself and James Chappell set the company up six years ago at a kitchen table in Camden, London, we ...

    Read Post
  • The Other Side of the Counter: DDoS, Social Engineering, Spambots and Insider Risks to Criminal Locations

    The Other Side of the Counter: DDoS, Social Engineering, Spambots and Insider Risks to Criminal Locations

    An enduring characteristic of dark web marketplaces is how frequently they’re offline, often through denial of services attacks. While marketplace ...

    Read Post
  • Cryptocurrency - The New Gold Rush for Cybercriminals

    Cryptocurrency - The New Gold Rush for Cybercriminals

    Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.

    Read Report
  • Digital Shadows - Monitor, Manage, and Remediate Your Digital Risk1:32

    Digital Shadows - Monitor, Manage, and Remediate Your Digital Risk

    See how Digital Shadows monitors, manages, and remediates digital risk across the widest range of data sources within the open, deep, and dark web.

    Watch Video
  • Leveraging the 2018 Verizon Data Breach Investigations Report

    Leveraging the 2018 Verizon Data Breach Investigations Report

    Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...

    Read Post
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Offsetting Dunbar by Developing Diversity

    Offsetting Dunbar by Developing Diversity

    Some of you may be familiar with the Dunbar Number, 150, being the maximum amount of relationships one individual can ...

    Read Post
  • GDPR Data Loss Assessment

    GDPR Data Loss Assessment

    Learn the benefits of the Digital Shadows GDPR Data Loss Assessment. We aim to help organizations get ahead of EU citizens reporting issues to regulators.

    Read Report
  • FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar0:00

    FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar

    Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.

    Watch Video
  • Cryptocurrency Fraud30:36

    Cryptocurrency Fraud

    Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies. Our research analysts discuss in this webinar.

    Watch Video
  • loading
    Loading More...