FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By Amir Khashayar Mohammadi August 11, 2020 3 MIN READ

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch.  

blog-icon
Blog
By A8 Team August 07, 2020 2 MIN READ

Modern CTO Interview: Flipping Turtles

Things move fast at Authentic8, most of the time. And if they don’t? That’s when leaders shine as enablers and get things back on track. Meet Kevin Lund, Chief Technology Officer and self-proclaimed…

blog-icon
Blog
By A8 Team July 31, 2020 1 MIN READ

Handbook: Tools, Tips and Tricks for Threat Hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.  

blog-icon
Blog
By A8 Team July 30, 2020 3 MIN READ

SPAs: attack surface-are-us

Web designers love single-page apps (SPAs) because they load quickly and conceal connection deficiencies. They are also the cause of data breaches.

blog-icon
Blog
By A8 Team July 21, 2020 5 MIN READ

Do Financial Crime Investigators Have a Bull’s Eye on Their Backs?

The COVID-19 pandemic seems like a double whammy for financial crime investigators. While online fraud has skyrocketed, teams are still adapting to a remote work environment. A recent survey among…

blog-icon
Blog
By A8 Team July 17, 2020 1 MIN READ

"Almost Like a Virtual Safe Room"

Are you following Smashing Security, the award-winning podcast with "a helpful and hilarious take on the week's tech SNAFUs" (tag line)? Check out this week's episode with Authentic8's Scott Petry.…

blog-icon
Blog
By Abel Vandegrift July 17, 2020 4 MIN READ

CMMC: Still on Track?

A landmark effort by the Department of Defense to shore up cybersecurity across its 300,000+ contractor base has managed to stay mostly on schedule despite the coronavirus pandemic. Let's take a…

blog-icon
Blog
By July 14, 2020 4 MIN READ

Is My Data for Sale on the Dark Web?

The pandemic is accelerating the move to location-distributed work. Want to know how the rush into remote work has weakened the cybersecurity posture of companies? You can find plenty of proof on…

blog-icon
Blog
By July 09, 2020 2 MIN READ

Authentic8 Silo Labeled High Performer on G2

G2 released its Summer 2020 reports, and — based on verified Authentic8 customer reviews — Silo is now considered a High Performer in the Threat Intelligence and Secure Web Gateways categories. G2…

Close
Close