Most Recent Videos

Automatically validate credentials in SearchLight

A short overview of the Digital Shadows SearchLight service

We're pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller & IT Security Services. In this special episode, Steve Marshall, Vikto

An in-depth look at triage and response options in SearchLight

Detailed overview of the customizable reporting options in SearchLight

As the world of remote work has become the norm, at least temporarily, the role of information security will either be the remote saviour or lockdown police. With video conference risks, phishing upt

An in-depth overview of how to best understanding different types of asset and their importance.

Organizations are now required to have an online presence to grow their brand and increase reach and overall exposure. Being online creates new threats – and those responsible for protecting the organ

Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has

Most threat intelligence fixates on collecting, analyzing and disseminating relevant data. But such an approach is reductive - and fails to address a central figure within this: remediation. While org

In this webinar, Harrison Van Riper and Alex Guirakhoo walk through the Ecosystem of Phishing. The team will cover: 1. New phishing data findings 2. How cybercriminals are crafting and distributing ph

Understand what the dark web really means, See where it can be useful, gain hands-on experience monitoring criminal sources, and learn about some free tools to get you started.

An overview of the new "Unauthorized Commit" risk.

An overview of how we calculate risk scores for marked document alerts, using the FAIR framework.