Infographics

Check out our infographics to learn about various topics from Business Email Compromise to digital risk management.

  • Common Typosquat and Combosquat Techniques

    Common Typosquat and Combosquat Techniques

    This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.

    Read Report
  • Digital Shadows and the Intelligence Cycle

    Digital Shadows and the Intelligence Cycle

    This illustration of the intelligence cycle will allow you to see what we do at each stage of the cycle to ensure we effectively answer stakeholder requirements.

    Read Report
  • Cyber Threat Intelligence Resources

    Cyber Threat Intelligence Resources

    A compilation of some of our favorite readings, resources, and tools that relate to Cyber Threat Intelligence.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Dark Web Monitoring Legal Considerations

    Dark Web Monitoring Legal Considerations

    Improve your understanding of the dark web threat landscape and legal precautions to consider when establishing dark web monitoring within your security teams.

    Read Report
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Dark Web Marketplace Trends

    Dark Web Marketplace Trends

    Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf

    Read Report
  • [Infographic] Threat Model of a Remote Worker

    [Infographic] Threat Model of a Remote Worker

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 (aka coronavirus) has forced many organizations to accelerate their plans or create them on the fly.

    Read Report
  • NIST Cybersecurity Framework - Mapping Digital Shadows

    NIST Cybersecurity Framework - Mapping Digital Shadows

    CISO Rick Holland shares how we have mapped SearchLight to the NIST Cybersecurity Framework.

    Read Report
  • 18 Reasons for Digital Risk Management

    18 Reasons for Digital Risk Management

    Learn 18 reasons why your organization needs digital risk management in this infographic.

    Read Report
  • 5 Ways Cybercriminals Can Access Your Emails Without Phishing

    5 Ways Cybercriminals Can Access Your Emails Without Phishing

    Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

    Read Report
  • How to Stay Secure at Conferences

    How to Stay Secure at Conferences

    Heading to a conference? Make sure to stay secure with these tips from our security team.

    Read Report
  • loading
    Loading More...