Most Recent Videos
Automatically validate credentials in SearchLight
A short overview of the Digital Shadows SearchLight service
We're pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller & IT Security Services. In this special episode, Steve Marshall, Vikto
An in-depth look at triage and response options in SearchLight
Detailed overview of the customizable reporting options in SearchLight
An in-depth overview of user management and permissions.
As the world of remote work has become the norm, at least temporarily, the role of information security will either be the remote saviour or lockdown police. With video conference risks, phishing upt
An in-depth look at Digital Shadows' collection methods.
An in-depth overview of how to best understanding different types of asset and their importance.
An in-depth overview of Shadow Search.
Organizations are now required to have an online presence to grow their brand and increase reach and overall exposure. Being online creates new threats – and those responsible for protecting the organ
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has
Most threat intelligence fixates on collecting, analyzing and disseminating relevant data. But such an approach is reductive - and fails to address a central figure within this: remediation. While org
In this webinar, Harrison Van Riper and Alex Guirakhoo walk through the Ecosystem of Phishing. The team will cover: 1. New phishing data findings 2. How cybercriminals are crafting and distributing ph
Understand what the dark web really means, See where it can be useful, gain hands-on experience monitoring criminal sources, and learn about some free tools to get you started.
An overview of the new "Unauthorized Commit" risk.
An overview of how we calculate risk scores for marked document alerts, using the FAIR framework.