Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more
Success Story
Success Story

Leading software developer uses Zero Trust Application Access to control app access for distributed workforce

A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices 

Read more

All resources

    Reset
    Video
    Video

    The worst thing in threat intelligence: A brief nobody reads | Intel Drop

    AJ Nash, Digital Intelligence Advocate at Authentic8, discusses the most common failure in threat intelligence: reports that go unread and unutilized. This episode dives into the importance of effective dissemination, highlighting how crucial it is to deliver the right information to the appropriate decision-makers in a timely manner and in an accessible format. Nash emphasizes understanding the specific needs of stakeholders and tailoring the delivery format accordingly to ensure intelligence is not just produced but also actionable and impactful.

    Watch Now
    screens displaying surveillance camera footage
    podcast-icon
    Podcast

    E97 | Is Mass Surveillance Helping or…
    E97 | Is Mass Surveillance Helping or Hindering Intelligence?

    Listen
    Video
    Video

    How a breach can start in your org chart | The Intel Drop

    AJ Nash dives into how organizational shortcomings, rather than technological failures, often lead to significant cybersecurity breaches. Highlighting case studies like Microsoft's midnight blizzard breach and the Change Healthcare breach, he emphasizes the critical role of clear governance and accountability in preventing such incidents. He discusses the recently updated Cybersecurity Performance Goals (CPG 2.0) from the CSA and stresses the importance of knowing and managing all systems within an organization.

    Watch Now
    Video
    Video

    The Intel Drop | Actionable intelligence is (mostly) a lie

    AJ Nash, Authentic8 Digital Intelligence Advocate, discusses the concept of actionable intelligence in the security field. AJ breaks down the gap between threat feeds and true intelligence, explaining why IOCs, CVEs, and reports still leave teams asking “so what?” Real value comes not from more data, but from intelligence that drives informed operations — something you can’t buy as a feed alone.

    Watch Now
    Black-bg-image
    podcast-icon
    Podcast

    E96 | Mastering the Art of Disappearing…
    E96 | Mastering the Art of Disappearing Online

    Listen
    Video
    Video

    The Intel Drop | Cognitive bias: assumptions impacting your investigations

    AJ Nash, Authentic8 Digital Intelligence Advocate, explain how confirmation bias, availability heuristic, and anchoring can lead security professionals astray, often resulting in misidentification and overlooked threats. Drawing from nearly two decades in the intelligence community, he highlights techniques like analysis of competing hypothesis and structured self-critique to mitigate these biases. Recognizing and countering these cognitive pitfalls is crucial for a robust, intelligence-driven security strategies.

    Watch Now
    Black-bg-image
    podcast-icon
    Podcast

    E94 | What is Cyber HUMINT?
    E94 | What is Cyber HUMINT?

    Listen
    Video
    Video

    China's five year plan and why you should care as an investigator

    China's Five-Year Plans outline the country's strategic priorities, impacting global economics and cybersecurity. In this video, AJ Nash, Digital Intelligence Advocate at Authentic8, dives into China's 15th Five-Year Plan, highlighting its importance for cybersecurity professionals. From economic goals to advancements in technology and foreign relations, Nash explains how China's roadmap can signal upcoming cyber threats and opportunities.

    Watch Now
    Dealing with AI Slop in OSINT Investigations
    podcast-icon
    Podcast

    E93 | Dealing with AI Slop in OSINT…
    E93 | Dealing with AI Slop in OSINT Investigations

    Listen
    Close
    Close