Digital Shadows Named a "Leader" in the 2018 Forrester New Wave for Digital Risk Protection. Access the full report to learn more.
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state ac...
Error - something went wrong!
Other content in this Stream
Third Party Risk
Learn how Digital Shadows monitors, manages, and remediates third party risks to your business.
Eliminating Third Party Cyber Risks from Healthcare Delivery
Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
Contractor Exposed Manufacturer's Sensitive Data
Digital Shadows helped a manufacturing firm discover that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage).
Five Threats to Financial Services: Part Four, Payment Card Fraud
Payment card information is the lifeblood of the cybercriminal ecosystem. In previous blogs in this series, we’ve focused on how ...
The State of Cybercrime in the Post-AlphaBay and Hansa Age
Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.
Demystifying the Dark Web and Mitigating Risks
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture
Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.
7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
PoS System Infects Hotel Chain with Malware
Digital Shadows helped a global hospitality and hotel chain discover that it's Point of Sale devices had been breached.
Episode 26: Mythbusting Vulnerabilities and Exploits
Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...
Leveraging the 2018 Verizon Data Breach Investigations Report
Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...
Digital Shadows finds 1.5 billion business and consumer files exposed online
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.
Lessons Learned from Equifax Breach
What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.
Security Analyst Spotlight Series: Rafael Amado
Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...
The Business of Disinformation: A Taxonomy
The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.
The Path to GDPR Compliance
Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.
Account Takeover: Protect Your Customer and Employee Accounts
Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.
3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web