Digital Shadows finds 1.5 billion business and consumer files exposed online
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR...
Error - something went wrong!
Most Recent Videos
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study
Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.
Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar
Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data,
Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar
The cyber talent gap is posing big challenges to enterprises and requires that security leaders implement innovative strategies to bridge the gap. During this informative session, you’ll learn from Ma
Digital Risk Protection and Threat Intelligence: An Overview
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
Photon Demonstration of Muraena
Digital Shadows' Photon Team configured Muraena to phish credentials from a test Google account, and used the existing Necrobrowser functionality to automate the mining of the target’s Gmail inbox usi
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows
CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.
Digital Shadows Photon Research Team
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar
The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting
How to Reduce Your Extortion Risks: Avoiding the Shakedown
In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r
Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar
In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Mitigating the Top 7 Dark Web Threats to Your Enterprise
The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p
Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar
By attending this session, you'll learn how threat actors and campaigns are leveraging exposed data, what digital risk and online exposure looks like, and how to efficiently manage digital risk. Resou
Digital Shadows and Splunk Integration
Digital Shadows SearchLightTM integrates with Splunk Enterprise and Splunk Enterprise Security, enabling security teams to correlate alerts, ingest the latest threat intelligence, and gain real-time c
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
Digital Shadows Shadow Search™ Demo
Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour
The Need for Digital Risk Protection - Digital Shadows and Digital Logistix