Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

a man sitting at a control station, with multiple computer monitors, participating in osint gathering

Open-source intelligence (OSINT) gathering

OSINT gathering can be a daunting task, but if you have a framework, create a plan and harness the right techniques, you can find the…

a computer processor, with the Chinese flag printed on it

OSINT news roundup: Tough climate for OSINT in China, promoting good OPSEC

Stay up to date with the latest OSINT news from around the world.

OSINT 2024 guide: tools and techniques

OSINT guide: tools and techniques for threat intelligence

Open-source intelligence (OSINT) techniques are invaluable to threat intelligence investigations. Find the tips, tools and shortcuts to…

gloved hands washing money representing money laundering financial crime

Uncovering individual backgrounds in financial crime investigations with OSINT

Solving financial crime plagues investigators, but open-source intelligence methods could be the key to saving billions annually.

Ship on rough waters

OSINT news roundup: Data leaks, OSINT for oceans and conflict zones

Stay up to date with the latest OSINT news from around the world.

Discord logo in front of blue cyber graphic of the globe

Collecting OSINT on Discord: a guide

An in-depth guide for collecting publicly available information on the popular voice, video and text messaging app, Discord, for OSINT…

Authentic8 x samdesk collaboration image

samdesk and Authentic8 team up to facilitate safer, faster decision-making in response to global events

Authentic8 and samdesk work together to provide analysts with the most reliable online research tools.

silhouetted man in cap sitting at computer

OSINT news roundup: War crimes, cyberspace and gender in OSINT

Stay up to date with the latest OSINT news from around the world.

Person wearing horse mask sitting at their laptop

What not to do on the dark web

While digital investigations can benefit from info on the dark web, venturing into this hidden web has unique challenges and hazards. To…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close