Technology

We help the world’s largest and fastest growing technology companies manage their digital risk.

  • Top Cyber Threats to the Technology Sector

    Top Cyber Threats to the Technology Sector

    Discover the top cyber threats to the technology industry.

    Read Report
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Episode 36: FIN7 Arrests and Phishing Threats

    Episode 36: FIN7 Arrests and Phishing Threats

    Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of...

    Read Post
  • Digital Risk Management for Technology

    Learn More
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Read Full Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Digital Shadows Contributes to Insider Threat Research

    Digital Shadows Contributes to Insider Threat Research

    On July 30, Forrester published its latest research report on malicious insiders, Defend Your Data As Insiders Monetize Their Access. ...

    Read Post
  • MITRE ATT&CK and GRU Indictment

    MITRE ATT&CK and GRU Indictment

    Read Report
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar0:00

    FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar

    Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.

    Watch Video
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to...

    Read Post
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar18:45

    The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar

    Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

    Watch Video
  • Security Analyst Spotlight Series: Rafael Amado

    Security Analyst Spotlight Series: Rafael Amado

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • Security and Privacy: How to grow the relationship

    Security and Privacy: How to grow the relationship

    Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.

    Read Post
  • Leveraging the 2018 Verizon Data Breach Investigations Report

    Leveraging the 2018 Verizon Data Breach Investigations Report

    Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...

    Read Post
  • Cryptocurrency - The New Gold Rush for Cybercriminals

    Cryptocurrency - The New Gold Rush for Cybercriminals

    Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.

    Read Report
  • Digital Shadows finds 1.5 billion business and consumer files exposed online1:29

    Digital Shadows finds 1.5 billion business and consumer files exposed online

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.

    Watch Video
  • Source Code and Admin Password Shared on Public Site by Developer

    Source Code and Admin Password Shared on Public Site by Developer

    Digital Shadows helped an IT manager of a large technology company discover a significant amount of their source code - including their credentials for their administrator - on a public site.

    Read Report
  • loading
    Loading More...