Welcome to the Authentic8 blog

Thursday, August 11
Person working on multiple monitors and laptops

Non-negotiable security needs SOCs to combat rise in phishing

Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
surface vs dark
Surface web vs. dark web: not as black and white as it may seem
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
How law enforcement can use OSINT
3 roadblocks for using OSINT in law enforcement

Latest blogs

https://new-blogs-authentic8.pantheonsite.io/blog/osint-news-russia-alt-jihad

OSINT news roundup: Nuclear sleuths, brandjacking and Russia’s westward military movement

Stay up-to-date with the latest OSINT news from around the world

Online research pro tips and pitfalls

Online research pro tips and pitfalls

Online research has become a critical business function and an invaluable practice to government and law enforcement agencies, but there…

generia blog

New White House action improves security of nation’s most sensitive systems

Presidential action expands the oversight role for the NSA regarding national security systems

Cryptomining and geopolitics

Cryptomining and geopolitics: why location matters

Cryptocurrency may seem like it’s not beholden to geographical borders, but the logistics of cryptomining — and the energy it requires —…

OSINT news roundup: Russia’s covert military moves, alt-jihadists and informing the gray zone

OSINT news roundup: Russia’s covert military moves, alt-jihadists and informing the gray zone

Stay up-to-date with the latest OSINT news from around the world

generia blog

Conducting online investigations for cyberthreat intelligence

Get the basics on online investigations to build cyberthreat intelligence, including the role of OSINT, typical workflows and more.

generia blog

Buy vs. build non-attributable networks

DIY approaches to powering secure, anonymous online research may seem cost-effective, but hard and soft costs combined show that’s not the…

generia blog

OSINT news roundup: vigilante hackers, digital order and homeland security

Stay up-to-date with the latest OSINT news from around the world

generia blog

Silo by Authentic8 ranked G2 leader in threat intelligence software

G2 has released their Winter 2022 reports based on verified customer reviews, market presence and more, with Silo by Authentic8 emerging as…

Blog updates

Stay updated with the latest posts from the blog
Close
Close