Learn how Digital Shadows monitors, manages, and remediates infrastructure exposure risks to your business.
Error - something went wrong!
Other content in this Stream
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar
Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?
Company Office Plan Leaked Online
Digital Shadows helped the Security Manager of a healthcare provider discover an unsecured File Transfer Protocol (FTP) server that included a PDF file of a blueprint for the client's office space.
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Demystifying the Dark Web and Mitigating Risks
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
Cyber Threats to Energy Sector Mergers & Acquisitions
7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture
Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.
Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs
The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to...
The State of Cybercrime in the Post-AlphaBay and Hansa Age
Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.
Blog | ICS Security: Strawmen In the Power Station
Congrats, it is now almost November and we have nearly made it through Cyber Security Awareness month (and what a ...
Escalation in Cyberspace: Not as Deniable as We All Seem to Think?
The recent assassination attempt on former Russian spy Sergey Skripal has led to a deluge of cyber-based conspiracy theories within ...
FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar
Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.
Company Named on Target List for Hacktivist Campaign
Digital Shadows helps the security manager of a bank discover that they had been named on the target list of a hacktivist operation's latest phase.
Cyber Security as Public Health
Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s ...
Episode 27: Attribution: The How, The What and The Why
Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances...
Security Analyst Spotlight Series: Rafael Amado
Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...
Digital Shadows finds 1.5 billion business and consumer files exposed online
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.
Best Practices for Data Breach Response with Experian
Organizations must not only defend against breaches, but ensure they have the people, process, and technology needed to respond to breaches in a compliant manner.
[Infographic] 18 Reasons for Digital Risk Management