Learn how Digital Shadows monitors, manages, and remediates data exposure risks to your business.
[On Demand Webinar] 3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web
In this live webinar with Forrester Research's Nick Hayes and Digital Shadows' Rick Holland, you will learn...
Error - something went wrong!
Other content in this Stream
Top Cyber Threats to the Retail Sector
Discover the top cyber threats to the retail industry.
Cryptocurrency - The New Gold Rush for Cybercriminals
Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.
Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware
This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit...
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.
[On Demand Webinar] FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar
Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.
GDPR Data Loss Assessment
Learn the benefits of the Digital Shadows GDPR Data Loss Assessment. We aim to help organizations get ahead of EU citizens reporting issues to regulators.
Blog | Ransomware in 2018: 4 Things to Look Out For
Ransomware remains an active threat for organizations into 2018. Last year, large scale attacks like NotPetya and WCry wreaked havoc, ...
[On Demand Webinar] Protecting Brands from Digital Risks and the Dark Web
Watch this on demand webinar to learn how to identify and eliminate counterfeit digital sites, social media, and apps and how to identify and mitigate threats from the dark web.
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.
Blog | Four Ways Criminals Are Exploiting Interest in Initial Coin Offerings
As consumers rush to be the first to invest in a promising new cryptocurrency or platform, their investments can instead go into the account of criminals.
[On Demand Webinar] Cryptocurrency Fraud
Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies. Our research analysts discuss in this webinar.
Inside Online Carding Courses Designed for Cybercriminals
Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.
Blog | Meltdown and Spectre: the story so far
On Wednesday, rumors surfaced that there were vulnerabilities in the majority of microprocessors, which would allow attackers to access system ...
The Path to GDPR Compliance
Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Digital Shadows helped an IT manager of an ecommerce retailer discover a Twitter account advertising 75% off coupons for their website.
Learn how Digital Shadows monitors, manages, and remediates brand exposure risks to your business.
Lessons Learned from Equifax Breach
What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.
Mobile Application Detected Impersonating Company Brand
Digital Shadows helped an IT manager of a retailer discover a mobile application impersonating their brand on a mobile app store.
[Infographic] 18 Reasons for Digital Risk Management
Learn 18 reasons why your organization needs digital risk management in this infographic.
Third Party Risk