Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More


Latest blogs

Topic : Cybersecurity
  • --Any--
  • Managed attribution
  • Intel and evidence
  • Cybersecurity
  • Dark web
  • Web isolation
generia blog

Establishing an intelligence process for your CTI team

While many cyberthreat intelligence teams rely on the traditional “Intelligence Cycle” or F3EAD models as they are defined, creating a…

generia blog

New White House action improves security of nation’s most sensitive systems

Presidential action expands the oversight role for the NSA regarding national security systems

Conducting online investigations for cyberthreat intelligence

Get the basics on online investigations to build cyberthreat intelligence, including the role of OSINT, typical workflows and more.

generia blog

Silo by Authentic8 ranked G2 leader in threat intelligence software

G2 has released their Winter 2022 reports based on verified customer reviews, market presence and more, with Silo by Authentic8 emerging as…

Tools, tips and methodologies for cyberthreat intelligence gathering

Our experts offer their recommendations for tools and techniques for every stage of threat intelligence research process.

21 OSINT research tools for threat intelligence investigations

Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their…

generia blog

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails…

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

generia blog

Cybersecurity executive order aims to uplevel protections across agencies

The Executive Order on Improving the Nation’s Cybersecurity takes aim at improving information sharing, supply chain security and tackling…

Blog updates

Stay updated with the latest posts from the blog