Home » Digital Shadows Resources Center » Digital Risk Protection and Threat Intelligence: An Overview
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digitalshadows.com/ Website: https://www.digitalshadows.com/ Subscribe to our Newsletter: https://info.digitalshadows.com/EmailSubscription-Youtube.html Twitter: https://twitter.com/digitalshadows Facebook: https://www.facebook.com/digitalshadows/ LinkedIn: https://www.linkedin.com/company/digital-shadows/
Dark Web Typosquatting: Scammers v. Tor
Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business worl...
Error - something went wrong!
Other content in this Stream
SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks
Since founding the company in 2011, we’ve had some memorable milestones: from the first release of SearchLight in 2014, to ...
Weekly Intelligence Summary 05 Sep - 12 Sep 2019
In the spotlight this week: Following reports that “APT3” used Equation Group tools prior to their public leak by the “Shadow Brokers” in 2016, cyber security researchers have provided additional ...
Metasploit Project Publishes Exploit For Bluekeep, plus APT3 and Silence Cybercrime Group Updates
Viktoria Austin is joined by Adam Cook and Phil Dohetry this week in the London office to talk about the top story this week: Metasploit Project publishes exploit for Bluekeep bug.
Dark Web Monitoring: The Good, The Bad, and The Ugly
Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Envoy on a Mission to Bring Stability to the Criminal Underground
All this turbulence has resulted in significant disruption and unrest within the overall cybercriminal scene and, in particular, has left a vacuum for English-language forums. It’s within this context
Breach! Exploring the Modern Digital Breach: Part 1
It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick
Two-Factor in Review
A technical assessment of the most popular mitigation for account takeover attacks
WTF is Digital Risk Protection
A quick guide to understanding how your company looks to attackers.
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
Fresh blow for dark web markets: Nightmare market in disarray
Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several ...
Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp
Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story...
The Account Takeover Kill Chain: A Five Step Analysis
Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
Detecting Spoof Domains - Domain Infringement | Case Study
See how one global retailer detected almost 2,000 domains impersonating their brand.
Harnessing Exposed Data to Enhance Cyber Intelligence
We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz
Managing Digital Risk: 4 Steps to Take
In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.
Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers
Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar