Home » Digital Shadows Resources Center » Eliminating Third Party Cyber Risks from Healthcare Delivery
Advice from the Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk
Rob Theis of World Innovation Lab dives into why companies must take digital risk seriously.
Error - something went wrong!
Other content in this Stream
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
Weekly Intelligence Summary 13 Jun - 20 Jun 2019
In the spotlight this week is a cyber-threat campaign involving the abuse of legitimate features in Google Calendar.
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity
This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other...
Managing Digital Risk: 4 Steps to Take
In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Managing Infosec Burnout: The Hidden Perpetrator
As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser
Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...
Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study
Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
Detecting Spoof Domains - Domain Infringement | Case Study
See how one global retailer detected almost 2,000 domains impersonating their brand.
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
Detecting Exposed Credentials | Case Study
See how one large bank detected more than 50,000 exposed credentials in 1 year.
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Dark Web Typosquatting: Scammers v. Tor
Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...
Digital Risk Protection and Threat Intelligence: An Overview
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
Detecting Fake Social Media Profiles | Case Study
See how a bank removed a spoof social media profiles targeting customers.
Detecting Infrastructure Weaknesses - Open Ports | Case Study
See how a technology company prevented a possible ransomware infection.
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar