Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

China's role in Fentanyl production

OSINT news roundup: China’s Fentanyl role, private military groups and “Shields Up”

This week’s OSINT news includes a review of the Cybersecurity and Infrastructure Agency’s (CISA) “Shields Up” campaign, focused on…

An eroding digital face

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

Defining OSINT

What we talk about when we talk about OSINT

What is OSINT? Defining a term for a living, evolving practice can be a challenge, subject to who you ask, what you’re referring to and a…

Person using smartphone

Beyond Twitter: 6 social media sites you should be using for OSINT research

Social media is rife with open-source information that can prove vital to OSINT, but are you using all the platforms at your disposal?

Private security guard

OSINT news roundup: China eyes on Ukraine, an end to nuclear secrecy, private security’s misinformation

While the world’s eyes are on Ukraine, one nation is paying special attention: China. The global super power with territorial axes to grind…

People standing around a computer

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

Microphone on a desk

Reporting live from the dark web

A conversation with the host of the Darknet Diaries podcast Jack Rhysider

Wheat fields in Ukraine

OSINT news roundup: attacks on crops, an “imminent” carrier launch and extremism on social media

Stay up to date with the latest OSINT news from around the world

Person working on multiple monitors and laptops

SOC analysts: 3 non-negotiable needs for online investigation

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close