Infographics
Check out our infographics to learn about various topics from Business Email Compromise to digital risk management.
-
Common Typosquat and Combosquat Techniques
This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.
-
Digital Shadows and the Intelligence Cycle
This illustration of the intelligence cycle will allow you to see what we do at each stage of the cycle to ensure we effectively answer stakeholder requirements.
-
Cyber Threat Intelligence Resources
A compilation of some of our favorite readings, resources, and tools that relate to Cyber Threat Intelligence.
-
Dark Web Monitoring Legal Considerations
Improve your understanding of the dark web threat landscape and legal precautions to consider when establishing dark web monitoring within your security teams.
-
Dark Web Marketplace Trends
Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf
-
[Infographic] Threat Model of a Remote Worker
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 (aka coronavirus) has forced many organizations to accelerate their plans or create them on the fly.
-
NIST Cybersecurity Framework - Mapping Digital Shadows
CISO Rick Holland shares how we have mapped SearchLight to the NIST Cybersecurity Framework.
-
18 Reasons for Digital Risk Management
Learn 18 reasons why your organization needs digital risk management in this infographic.
-
5 Ways Cybercriminals Can Access Your Emails Without Phishing
Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.
-
How to Stay Secure at Conferences
Heading to a conference? Make sure to stay secure with these tips from our security team.
-
Loading More...