Physical Threats

Increasingly physical threats in the real world are organized, planned and publicized online.

  • Physical Threat

    Physical Threat

    Learn how Digital Shadows monitors, manages, and remediates physical threats to your business.

    Read Report
  • Resort’s Swimming Pool Control Panel Publicly Accessible Online

    Resort’s Swimming Pool Control Panel Publicly Accessible Online

    Digital Shadows helped the Incident Response Manager of a global resort company discover the control panel that controls all their swimming pools was openly accessibly online.

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Digital Shadows Contributes to Insider Threat Research

    Digital Shadows Contributes to Insider Threat Research

    On July 30, Forrester published its latest research report on malicious insiders, Defend Your Data As Insiders Monetize Their Access. ...

    Read Post
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Read Full Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar0:00

    FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar

    Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.

    Watch Video
  • Digital Shadows Dark Web and Deep Web Intelligence Datasheet

    Digital Shadows Dark Web and Deep Web Intelligence Datasheet

    Learn the importance of Dark and Deep Web Source Intelligence to Minimize your Digital Risk.

    Read Report
  • 3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web58:41

    3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web

    In this live webinar with Forrester Research's Nick Hayes and Digital Shadows' Rick Holland, you will learn why it is critical to monitor and manage digital risk across the widest range of data source

    Watch Video
  • Digital Shadows Overview

    Digital Shadows Overview

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.

    Read Report
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • Episode 26: Mythbusting Vulnerabilities and Exploits

    Episode 26: Mythbusting Vulnerabilities and Exploits

    Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...

    Read Post
  • Security Analyst Spotlight Series: Rafael Amado

    Security Analyst Spotlight Series: Rafael Amado

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.

    Read Report
  • Hacktivism: Inside the house Anonymous built: 1/24:41

    Hacktivism: Inside the house Anonymous built: 1/2

    The first in a two part series on hacktivism, looking at the its origins and the motivations behind some threat actors. Visit http://info.digitalshadows.com/LiveDemoRequest-youtube.html to schedule a

    Watch Video
  • Cyber Security as Public Health

    Cyber Security as Public Health

    Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s ...

    Read Post
  • The Business of Disinformation: A Taxonomy

    The Business of Disinformation: A Taxonomy

    The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.

    Read Report
  • 18 Reasons for Digital Risk Management

    18 Reasons for Digital Risk Management

    Learn 18 reasons why your organization needs digital risk management in this infographic.

    Read Report
  • loading
    Loading More...