Videos | Digital Shadows

Check out our videos around digital risk protection, threat intelligence, and our SearchLight platform.

  • SearchLight in 4 Minutes3:58

    SearchLight in 4 Minutes

    A four-minute overview of Digital Shadows SearchLight and it's key capabilities.

    Watch Video
  • Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors0:00

    Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    Join the Photon team to learn about our latest research on account takeover.

    Watch Video
  • Threat Model of a Remote Worker [Recorded Webinar]56:31

    Threat Model of a Remote Worker [Recorded Webinar]

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has

    Watch Video
  • Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study4:46

    Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study

    Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.

    Watch Video
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Careers at Digital Shadows3:42

    Careers at Digital Shadows

    Digital Shadows is proud of the exceptional team we have assembled and the culture we have created. We have codified our culture into a set of values defined by the team themselves that we have used t

    Watch Video
  • ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows2:41

    ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows

    CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.

    Watch Video
  • RANT Radio Adversarial Debate: The Role of InfoSec in the Remote World56:36

    RANT Radio Adversarial Debate: The Role of InfoSec in the Remote World

    As the world of remote work has become the norm, at least temporarily, the role of information security will either be the remote saviour or lockdown police. With video conference risks, phishing upt

    Watch Video
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • Brands Under Attack: How to protect your brand online | Recorded Webinar with Spire1:01:48

    Brands Under Attack: How to protect your brand online | Recorded Webinar with Spire

    In this webinar, Jamie Collier at Digital Shadows and Rami Refaat at Spire Solutions walk through brand protection.

    Watch Video
  • The Cybercriminal Forum is Not Dead | Recorded Webinar45:01

    The Cybercriminal Forum is Not Dead | Recorded Webinar

    With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums

    Watch Video
  • Dark Web Monitoring Use Case | Digital Shadows2:54

    Dark Web Monitoring Use Case | Digital Shadows

    Gain visibility into criminal and fraudulent activity impacting your brand on the deep and dark web. Learn more at https://www.digitalshadows.com/dark-web-monitoring/

    Watch Video
  • Data Leakage Detection Use Case | Digital Shadows3:27

    Data Leakage Detection Use Case | Digital Shadows

    Detect sensitive data that's been exposed by employees, contractors, or third parties. Learn more at https://www.digitalshadows.com/data-leakage-detection/

    Watch Video
  • Phishing Protection Use Case | Digital Shadows0:00

    Phishing Protection Use Case | Digital Shadows

    Discover attackers impersonating your domains, social accounts, and mobile applications. Learn more at https://www.digitalshadows.com/phishing-protection/

    Watch Video
  • Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 819:50

    Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 8

    Rick Holland and Richard Gold talk through the team's research into Iranian APT groups' tradecraft styles using Mitre ATT&CK™ and the ASD Essential 8.

    Watch Video
  • Iranian Cyber Threats: Practical Advice for Security Professionals28:12

    Iranian Cyber Threats: Practical Advice for Security Professionals

    Rick Holland and Harrison Van Riper sit down to walk through Rick's latest blog on advice around the Iranian cyber threats.

    Watch Video
  • Typosquatting and the 2020 U.S. Presidential election10:00

    Typosquatting and the 2020 U.S. Presidential election

    Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains

    Watch Video
  • Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division56:13

    Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division

    The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v

    Watch Video
  • Breach! Exploring the Modern Digital Breach: Part 228:13

    Breach! Exploring the Modern Digital Breach: Part 2

    What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit

    Watch Video
  • loading
    Loading More...