Welcome to the Authentic8 blog

Friday, September 30
An eroding digital face

Virtual machine vs. managed attribution: which is better?

Person working on multiple monitors and laptops
Non-negotiable security needs SOCs to combat rise in phishing
Defining OSINT
What we talk about when we talk about OSINT
Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller

Latest blogs

generia blog

81% of CIOs and CISOs Defer Critical Updates or Patches

New research indicates that eight out of ten CIOs and CISOs refrain from adopting an important security update or patch, due to concerns…

generia blog

FiServ: Minimize Vendor Risk Online in One Quick Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment advisors, and wealth management firms who worry…

generia blog

VPN: A Big Misunderstanding?

Most VPN services fail to provide a level of data protection and anonymity that would pass professional-level muster. Part 3 of our VPN…

generia blog

How Watering Hole Attacks Target the Financial Sector and Governments

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance,…

generia blog

VPN for Secure and Private Web Access? Think Again.

Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? Many…

generia blog

VPN and privacy: what nobody told you

Did you know that ISPs can use VPN to spy on you? Third parties taking advantage of your VPN’s many flaws for nefarious purposes. We…

generia blog

Financial Services: Blindspot Browser

For regulated investment firms, the SEC’s Office of Compliance Inspections and Examinations (OCIE) has prioritized “cybersecurity with an…

generia blog

Quick dissections: Collections 2-5

The Collection #1 loot archive of stolen credentials is only the tip of the archive. All 5 collections contain more than 1TB of raw…

generia blog

Why Your Defender’s Paradigm Isn’t Working Anymore

Why does it seem like despite the ever-evolving technology and the billions of dollars being spent on cybersecurity, that the attackers are…

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close