Security teams seeking to identify weaknesses in their infrastructure may turn to a range of tools. While it's easy to perform a vulnerability scan against known assets, ascertaining what is the highest priority is difficult. Worse still, it’s difficult to identify and keep track of the infrastructure you are trying to protect.
Patrolling the Dark Net
How can organizations mitigate the risks posed from the dark web? Hear from Digital Shadows' CTO and Co-Fou...
Error - something went wrong!
Most Recent Videos
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
Typosquatting and the 2020 U.S. Presidential election
Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains
Dark Web Monitoring Use Case | Digital Shadows
Gain visibility into criminal and fraudulent activity impacting your brand on the deep and dark web. Learn more at https://www.digitalshadows.com/dark-web-monitoring/
Breach! Exploring the Modern Digital Breach: Part 1
It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick
Data Leakage Detection Use Case | Digital Shadows
Detect sensitive data that's been exposed by employees, contractors, or third parties. Learn more at https://www.digitalshadows.com/data-leakage-detection/
Breach! Exploring the Modern Digital Breach: Part 2
What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit
Digital Risk Protection and Threat Intelligence: An Overview
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study
Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.
Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division
The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v
Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula
Phishing Protection Use Case | Digital Shadows
Discover attackers impersonating your domains, social accounts, and mobile applications. Learn more at https://www.digitalshadows.com/phishing-protection/
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar
Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.
Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar
Hear from Marc Crudgington, CISO at Woodforest Bank, about the innovative programs he’s put in place to protect his IT infrastructure with a limited staff.
Photon Demonstration of Muraena
Digital Shadows' Photon Team configured Muraena to phish credentials from a test Google account, and used the existing Necrobrowser functionality to automate the mining of the target’s Gmail inbox usi
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows
CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.
Digital Shadows Photon Research Team
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar
Hear about the shifting regulatory landscape and the growth in breach notification legislation, including practical guidance on how and when to notify customers and authorities.
How to Reduce Your Extortion Risks: Avoiding the Shakedown
In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r
Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar