VIP Exposure

The digital world puts your VIPs and executives at risk. Protect them with digital risk management.

  • VIP Exposure

    VIP Exposure

    Learn how Digital Shadows monitors, manages, and remediates VIP exposure risks to your business.

    Read Report
  • Law Firm Uncovers Sensitive Executive Details Online

    Law Firm Uncovers Sensitive Executive Details Online

    Digital Shadows helped a regional law firm discover key employee details exposed online for its Chief Counsel - including family names and home addresses.

    Read Report
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Protect Against Threats Targeted at Your Executives

    Request a Demo
  • The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

    The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

    While the dark web is overhyped, it’s not all a load of hocus pocus. Nevertheless, you shouldn’t be waiting until data is offered for sale on the dark web – there’s plenty you can be doing to prev...

    Read Post
  • Read Full Report
  • Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work

    Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work

    This week, National Cyber Security Awareness Month (NCSAM) focuses on accountability and responsibility within the information security space: “It’s Everyone’s ...

    Read Post
  • Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions49:02

    Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions

    During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

    Watch Video
  • Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed

    Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed

    Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru...

    Read Post
  • Business Email Compromise: When You Don’t Need to Phish

    Business Email Compromise: When You Don’t Need to Phish

    According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since ...

    Read Post
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • Cyber Security Awareness Month: Week 1 – Credential Hygiene

    Cyber Security Awareness Month: Week 1 – Credential Hygiene

    It’s the opening week of the annual National Cyber Security Awareness Month (U.S.) and Cyber Security Month (Europe). While good ...

    Read Post
  • Advice from the Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

    Advice from the Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

    Rob Theis of World Innovation Lab dives into why companies must take digital risk seriously.

    Read Report
  • Digital Shadows Shadow Search™ Demo2:10

    Digital Shadows Shadow Search™ Demo

    Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour

    Watch Video
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • Why Marketing Leaders Must Take Action To Manage Digital Risk And Protect Their Brand

    Why Marketing Leaders Must Take Action To Manage Digital Risk And Protect Their Brand

    I am one of you. I have been in the marketing field for more than 20 years and have seen ...

    Read Post
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • 7 Stages of Account Takeover1:46

    7 Stages of Account Takeover

    Download the full report here: http://info.digitalshadows.com/AccountTakeover-YouTube_Registration.html Billions of leaked credentials are exposed online every year. Cybercriminals are increasingly t

    Watch Video
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.

    Read Report
  • loading
    Loading More...