Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

Trust and safety: rebranding of an old concept, or a new way to look at customer interaction?

What is a trust and safety team? What's their mission? How are trust and safety online investigators different from payment fraud and …

generia blog

Silo by Authentic8 is first authorized FedRAMP web isolation platform

Authentic8 is proud to announce its cloud-based platform is the first authorized FedRAMP web isolation solution meeting strict security…

generia blog

Naked and exposed: stop investigating online without managed attribution

Everything you wanted to know about browser fingerprint, managed attribution and non-attribution — but didn’t know who to ask.

generia blog

OSINT data collection: you still need humans, but automation is well worth the investment

OSINT data collection automation ensures that teams are gathering the most relevant data as quickly and efficiently as possible, while…

generia blog

Tradecraft webinar: secure and effective financial crime investigations

Learn how to use the dark web for your financial crime investigations. An introductory webinar for beginners and those who are curious.

generia blog

OSINT OPSEC: not just for government anymore

OSINT OPSEC is critical for any type of investigator to protect their mission, organization and themselves from cyber adversaries.  

generia blog

New Silo-Splunk integration for SOCs automates log correlation

New Silo for Safe Access feature provides Splunk integration for SOCs to monitor employee web and SaaS app access on any device, managed or…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close