Welcome to the Authentic8 blog

Thursday, December 8
Woman working at standing desk

Remote work is just work: secure the new normal

surface vs dark
Surface web vs. dark web: not as black and white as it may seem
compromised crops
OSINT news roundup: compromised crops, bridge saboteurs and tech surveillance
Conveyor belts of boxes
Automating collection for SOC investigations
man at computer at night
Why you should be on the dark web

Latest blogs

OSINT in the FY23

OSINT in the FY23 Defense and Intelligence Authorization Bills

We break down the intelligence authorization bills currently moving through the U.S. House and Senate. If passed, they could help bolster…

China's role in Fentanyl production

OSINT news roundup: China’s Fentanyl role, private military groups and “Shields Up”

This week’s OSINT news includes a review of the Cybersecurity and Infrastructure Agency’s (CISA) “Shields Up” campaign, focused on…

An eroding digital face

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

Defining OSINT

What we talk about when we talk about OSINT

What is OSINT? Defining a term for a living, evolving practice can be a challenge, subject to who you ask, what you’re referring to and a…

Person using smartphone

Beyond Twitter: 6 social media sites you should be using for OSINT research

Social media is rife with open-source information that can prove vital to OSINT, but are you using all the platforms at your disposal?

Private security guard

OSINT news roundup: China eyes on Ukraine, an end to nuclear secrecy, private security’s misinformation

While the world’s eyes are on Ukraine, one nation is paying special attention: China. The global super power with territorial axes to grind…

People standing around a computer

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

Microphone on a desk

Reporting live from the dark web

A conversation with the host of the Darknet Diaries podcast Jack Rhysider

Wheat fields in Ukraine

OSINT news roundup: attacks on crops, an “imminent” carrier launch and extremism on social media

Stay up to date with the latest OSINT news from around the world

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close