Technology

We help the world’s largest and fastest growing technology companies manage their digital risk.

  • Top Cyber Threats to the Technology Sector

    Top Cyber Threats to the Technology Sector

    The nature of the services offered by technology companies means they often collect sensitive customer data and supply critical communication infrastructure to their clients.

    Read Report
  • ×

    Live Webinar on
    April 9th:

    Cyber Threats and The Shifting Regulatory Landscape

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 April - Cyber Threats and Regulatory Landscape Webinar
    Thank you!
    Error - something went wrong!
  • ×

    Live Webinar
    March 27:

    How to Reduce Your Extortion Risks

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 March - Extortion Webinar
    Thank you!
    Error - something went wrong!
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Weekly Intelligence Summary 14 Feb - 21 Feb 2019

    Weekly Intelligence Summary 14 Feb - 21 Feb 2019

    Highlights from the week include: A new financially motivated threat actor advertised up to 841 million data records for sale on Dream Market; “APT-C-36” has targeted multiple Colombian sectors, inclu

    Read Report
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

    Read Report
  • Read Full Report
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...

    Read Post
  • Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...

    Read Post
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Detecting Infrastructure Weaknesses - Open Ports

    Detecting Infrastructure Weaknesses - Open Ports

    See how a technology company prevented a possible ransomware infection.

    Read Report
  • Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

    Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

    The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents ...

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Sextortion 2.0: A New Lure

    Sextortion 2.0: A New Lure

    Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. ...

    Read Post
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set ...

    Read Post
  • Black Friday and Cybercrime: Retail’s Frankenstein Monster

    Black Friday and Cybercrime: Retail’s Frankenstein Monster

    With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even ...

    Read Post
  • Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

    Read Report
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • loading
    Loading More...