Attend one of our upcoming live webinars or watch a previous one on-demand.
Live Webinar: Bad at Keeping Secrets? Understanding the Risk of Exposed Access Keys
There’s a dilemma facing organizations with software development functions. Companies that build software products and must ship them to their users, and quickly. However, all too often, security team
Panel Discussion: Deep Dive into the 2020 Cyber Threat Intelligence Estimate
Join us for a panel discussion on the key findings from the 2020 Cyber Threat Intelligence Estimate.
Ransomware Round-Up: Trends in Q2 - August 2020
The Digital Shadows Photon Research team review ransomware variants observed this year and dive into how security teams can strengthen their operations in response to the recent trends.
Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors
Join the Photon team to learn about our latest research on account takeover.
RANT Events - Cybersecurity People: The Good, The Bad and The Broken
RANT has teamed up with Digital Shadows to try answer a number of cybersecurity related questions while raising money for Barnardo’s. Check out the recording here!
Outside-In Intelligence for DevSecOps - Digital Shadows
Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.
Dark Web Digest: Gaining Valuable Threat Intel from Cybercriminal Forums
In this webinar, Alex and Kacey cover dark web trends that we have recently observed, the risk impact associated with cybercriminal behaviors, and mitigation strategies for your organization.
Threat Model of a Remote Worker [Recorded Webinar]
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has
RANT Radio - Adversarial Debate - The Role of InfoSec in the Remote World
As the world of remote work has become the norm, at least temporarily, the role of information security will either be the remote saviour or lockdown police. With video conference risks, phishing upt
Dark Web & Cybercriminal Trends | Digital Shadows April ISSA Presentation
Jim Morin of Digital Shadows talks through Markets, AVC, and forums trends in 2019, Key use cases for “dark web monitoring”, and Free tools to help you mitigate risk on the dark web for your organizat
Brands Under Attack: How to protect your brand online | Recorded Webinar with Spire
In this webinar, Jamie Collier at Digital Shadows and Rami Refaat at Spire Solutions walk through brand protection.
Operationalizing Alerts - The Problem with Sitting in Triage
In this webinar, we will outline how organizations use dedicated playbooks to significantly reduce the amount of time it takes to action and respond to incidents.
Beware of Phishers: New Research into the Ecosystem of Phishing
In this upcoming webinar, Harrison Van Riper and Alex Guirakhoo walk through the Ecosystem of Phishing. The team will cover New phishing data findings, How cybercriminals are crafting and distributing
Iranian Cyber Threats: Practical Advice for Security Professionals
Rick Holland and Harrison Van Riper sit down to walk through Rick's latest blog on advice around the Iranian cyber threats.
Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 8
Rick Holland and Richard Gold talk through the team's research into Iranian APT groups' tradecraft styles using Mitre ATT&CK™ and the ASD Essential 8.
The Cybercriminal Forum is Not Dead | Recorded Webinar
With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums
Typosquatting and the 2020 U.S. Presidential election
Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains
Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division
The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v
Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar
Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.