Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data, systems or network access, their attack surface poses a threat to your data. Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen acc...
Other content in this Stream
As the leader in threat intel and drp SearchLight is the most comprehensive and awarded solution available. Ready to learn a better way to tackle Threat Intelligence? Get started today!
Digital Shadows CISO, Rick Holland, hosts Demystifying Mentorship as a part of Devo's 2021 SOC Analyst Appreciation Day.
Threat intelligence is noisy. Tune out the noise with Digital Shadows. Visit www.digitalshadows.com to schedule a demo today!
A four-minute overview of Digital Shadows SearchLight and it's key capabilities.
Join the Photon team to learn about our latest research on account takeover.
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has
Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
As part of the Taylor Vinters Founders Series, Emily Francis spoke to James Chappell, Co-founder and Chief Innovation Officer of Digital Shadows.
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the
Digital Shadows is proud of the exceptional team we have assembled and the culture we have created. We have codified our culture into a set of values defined by the team themselves that we have used t
CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.
As the world of remote work has become the norm, at least temporarily, the role of information security will either be the remote saviour or lockdown police. With video conference risks, phishing upt
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
In this webinar, Jamie Collier at Digital Shadows and Rami Refaat at Spire Solutions walk through brand protection.
With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums
Gain visibility into criminal and fraudulent activity impacting your brand on the deep and dark web. Learn more at https://www.digitalshadows.com/dark-web-monitoring/
Detect sensitive data that's been exposed by employees, contractors, or third parties. Learn more at https://www.digitalshadows.com/data-leakage-detection/
Discover attackers impersonating your domains, social accounts, and mobile applications. Learn more at https://www.digitalshadows.com/phishing-protection/
Rick Holland and Richard Gold talk through the team's research into Iranian APT groups' tradecraft styles using Mitre ATT&CK™ and the ASD Essential 8.