Learn how Digital Shadows monitors, manages, and remediates third party risks to your business.
Error - something went wrong!
Other content in this Stream
Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware
This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit...
PoS System Infects Hotel Chain with Malware
Digital Shadows helped a global hospitality and hotel chain discover that it's Point of Sale devices had been breached.
The Business of Disinformation: A Taxonomy
The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.
The Path to GDPR Compliance
Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.
Blog | Meltdown and Spectre: the story so far
On Wednesday, rumors surfaced that there were vulnerabilities in the majority of microprocessors, which would allow attackers to access system ...
Contractor Exposed Manufacturer's Sensitive Data
Digital Shadows helped a manufacturing firm discover that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage).
[Infographic] 18 Reasons for Digital Risk Management
Learn 18 reasons why your organization needs digital risk management in this infographic.
Lessons Learned from Equifax Breach
What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.
[On Demand Webinar] 3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web
In this live webinar with Forrester Research's Nick Hayes and Digital Shadows' Rick Holland, you will learn why it is critical to monitor and manage digital risk across the widest range of data source
Company Office Plan Leaked Online
Digital Shadows helped the Security Manager of a healthcare provider discover an unsecured File Transfer Protocol (FTP) server that included a PDF file of a blueprint for the client's office space.
Account Takeover: Protect Your Customer and Employee Accounts
Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.
OReilly - Patrolling the Dark Net
This report explores both the benign and malevolent activities of the dark net, and the dark web.
The Intelligence Cycle: The Collection Plan
An overview of Digital Shadows' Collection Plan, and how it intersects with the Intelligence Cycle. To learn more, watch our video demo: http://info.digitalshadows.com/FullLengthDemo-youtube.html
Inside Online Carding Courses Designed for Cybercriminals
Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.
Digital Shadows Overview
Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.
Industries Most Likely to be Targeted by Credential Stuffing Attempts