Insurance

See how we help Insurances companies by providing intelligence regarding cybercrime actors, detecting exposed employee credentials, and to monitoring for phishing sites targeting customers.

  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Discover attackers impersonating your domains, social accounts, and mobile applications.

    Learn More
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Digital Shadows SearchLight™

    Digital Shadows SearchLight™

    Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface.

    Read Report
  • The Ecosystem of Phishing: From Minnows to Marlins

    The Ecosystem of Phishing: From Minnows to Marlins

    $1 for a cheap domain. $12.99 for 10m email contacts. Cybercriminals can launch phishing campaigns for under $20!

    Read Post
  • Phishing Protection

    Phishing Protection

    Discover attackers impersonating your domains, social accounts, people, and mobile applications.

    Read Report
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

    How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • The Modern Cybercriminal Forum

    The Modern Cybercriminal Forum

    We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.

    Read Report
  • Account Takeover: Protect Your Customer and Employee Accounts

    Account Takeover: Protect Your Customer and Employee Accounts

    Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Account Takeover Prevention

    Account Takeover Prevention

    Detect exposed employee credentials before attackers do.

    Read Report
  • Mimecast and Digital Shadows Integration

    Mimecast and Digital Shadows Integration

    Digital Shadows integrates with Mimecast email security to proactively protect your employees from known domains posing a phishing risk, reducing the likelihood of successful phishing attacks.

    Read Report
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • loading
    Loading More...