Welcome to the Authentic8 blog

Thursday, August 11
Person working on multiple monitors and laptops

Non-negotiable security needs SOCs to combat rise in phishing

Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
surface vs dark
Surface web vs. dark web: not as black and white as it may seem
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
How law enforcement can use OSINT
3 roadblocks for using OSINT in law enforcement

Latest blogs

generia blog

VPN for Secure and Private Web Access? Think Again.

Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? Many…

generia blog

VPN and privacy: what nobody told you

Did you know that ISPs can use VPN to spy on you? Third parties taking advantage of your VPN’s many flaws for nefarious purposes. We…

generia blog

Financial Services: Blindspot Browser

For regulated investment firms, the SEC’s Office of Compliance Inspections and Examinations (OCIE) has prioritized “cybersecurity with an…

generia blog

Quick dissections: Collections 2-5

The Collection #1 loot archive of stolen credentials is only the tip of the archive. All 5 collections contain more than 1TB of raw…

generia blog

Why Your Defender’s Paradigm Isn’t Working Anymore

Why does it seem like despite the ever-evolving technology and the billions of dollars being spent on cybersecurity, that the attackers are…

generia blog

Interview: SEC Compliance and the Internet

Key Issues for Investment Management Firms What are the challenges regulated investment management firms are facing when using the…

Blog updates

Stay updated with the latest posts from the blog
Close
Close