Infrastructure Exposure

Vulnerabilities in your infrastructure create gaps for easy exploitation. Identify and repair them with digital risk management.

  • Infrastructure Exposure

    Infrastructure Exposure

    Learn how Digital Shadows monitors, manages, and remediates infrastructure exposure risks to your business.

    Read Report
  • Read Full Report
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar18:45

    The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar

    Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

    Watch Video
  • Identify weak spots in your infrastructure

    Request a Demo
  • Company Office Plan Leaked Online

    Company Office Plan Leaked Online

    Digital Shadows helped the Security Manager of a healthcare provider discover an unsecured File Transfer Protocol (FTP) server that included a PDF file of a blueprint for the client's office space.

    Read Report
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Cyber Threats to Energy Sector Mergers & Acquisitions

    Cyber Threats to Energy Sector Mergers & Acquisitions

    Read Report
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to...

    Read Post
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Blog | ICS Security: Strawmen In the Power Station

    Blog | ICS Security: Strawmen In the Power Station

    Congrats, it is now almost November and we have nearly made it through Cyber Security Awareness month (and what a ...

    Read Post
  • Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

    Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

    The recent assassination attempt on former Russian spy Sergey Skripal has led to a deluge of cyber-based conspiracy theories within ...

    Read Post
  • FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar0:00

    FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar

    Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.

    Watch Video
  • Company Named on Target List for Hacktivist Campaign

    Company Named on Target List for Hacktivist Campaign

    Digital Shadows helps the security manager of a bank discover that they had been named on the target list of a hacktivist operation's latest phase.

    Read Report
  • Cyber Security as Public Health

    Cyber Security as Public Health

    Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s ...

    Read Post
  • Episode 27: Attribution: The How, The What and The Why

    Episode 27: Attribution: The How, The What and The Why

    Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances...

    Read Post
  • Security Analyst Spotlight Series: Rafael Amado

    Security Analyst Spotlight Series: Rafael Amado

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • Digital Shadows finds 1.5 billion business and consumer files exposed online1:29

    Digital Shadows finds 1.5 billion business and consumer files exposed online

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.

    Watch Video
  • Best Practices for Data Breach Response with Experian57:11

    Best Practices for Data Breach Response with Experian

    Organizations must not only defend against breaches, but ensure they have the people, process, and technology needed to respond to breaches in a compliant manner.

    Watch Video
  • loading
    Loading More...