Welcome to the Authentic8 blog

Thursday, December 8
Woman working at standing desk

Remote work is just work: secure the new normal

surface vs dark
Surface web vs. dark web: not as black and white as it may seem
compromised crops
OSINT news roundup: compromised crops, bridge saboteurs and tech surveillance
Conveyor belts of boxes
Automating collection for SOC investigations
man at computer at night
Why you should be on the dark web

Latest blogs

Cybersecurity executive order: one-year anniversary

Cybersecurity executive order: one-year anniversary

The executive order, Improving the Nation’s Cybersecurity, seeks to improve the federal government’s cybersecurity across agencies. One…

Give CTI its own seat at the table

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

staged photos and intercepted comms

OSINT news roundup: staged photos, intercepted comms and threat products

Stay up-to-date with the latest OSINT news from around the world

How law enforcement can use OSINT

3 roadblocks for using OSINT in law enforcement

Open-source intelligence plays a large role in closing investigations, but it’s still underutilized in the field. Here’s why.  

OSINT news roundup: apps to report war crimes, disguised disinfo and Bucha

OSINT news roundup: apps to report war crimes, disguised disinfo and Bucha

Stay up to date with the latest OSINT news from around the world

How adversaries use researcher’s digital fingerprint against them

How adversaries use researcher’s digital fingerprint against them

Hidden dangers are lurking in your digital fingerprint. Here's how to manage it.

OSINT news roundup: oligarchs, propaganda and how tech shifts a war

OSINT news roundup: oligarchs, propaganda and how tech shifts a war

Stay up to date with the latest OSINT news from around the world

ZAPAD 2021 precursor to Russian invasion of Ukraine

Russia/Ukraine conflict: ZAPAD 2021’s insight into military operations

Russia’s joint military exercise ZAPAD in September 2021 seems a precursor to its invasion of Ukraine. We look at how the event prepared…

Twitter mobile phone application

OSINT news roundup: Twitter sleuths, transparency and the cost of cybercrime

Stay up to date with the latest OSINT news from around the world

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close