Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more
Success Story
Success Story

Leading software developer uses Zero Trust Application Access to control app access for distributed workforce

A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices 

Read more

All resources

    Reset
    Video
    Video

    The Intel Drop | On the intelligence tradecraft shortage

    AJ Nash, Authentic8 Digital Intelligence Advocate, argues that while many cybersecurity analysts possess technical skills, they lack the training to think analytically and provide actionable intelligence. Discover why structured thinking, hypothesis testing and effective communication are crucial for cyber threat intelligence, and why AI isn't yet capable of solving these complex issues. Learn how investing in intelligence training can bridge this crucial gap and drive better decision-making in the cybersecurity industry.

    Watch Now
    Data Sheet
    Data Sheet

    Silo Data Sheet - Free Trial

    Read more
    Graphic image featuring a profile of a human head overlaid with digital circuit patterns and a multi-colored sound wave, symbolizing technology and data analysis.
    podcast-icon
    Podcast

    E89 | Adding Agentic AI to analysis
    E89 | Adding Agentic AI to analysis

    Listen
    Video
    Video

    The Intel Drop | It's all intelligence to me

    AJ Nash, Digital Intelligence Advocate for Authentic8, argues for a more holistic approach to intelligence, emphasizing that segregating intelligence into narrow categories limits the understanding of adversaries and their strategies.

    Watch Now
    Hacker summer camp 2025
    podcast-icon
    Podcast

    E88 | Hacker Summer Camp 2025
    E88 | Hacker Summer Camp 2025

    Listen
    Video
    Video

    The Intel Drop | Beyond jargon: "left of boom" and the cyber adversary

    AJ Nash explains the concept of 'left of Boom' beyond its military origins. He explores its relevance to cybersecurity, emphasizing the importance of proactive intelligence to prevent attacks rather than just responding to them. He highlights the need for understanding adversary operations, building cooperative relationships, and shifting from a defensive mindset to an intelligence-driven security approach.

    Watch Now
    cyber data wave
    podcast-icon
    Podcast

    E87 | Intelligence tradecraft in the…
    E87 | Intelligence tradecraft in the digital age

    Listen
    Video
    Video

    The Intel Drop | Setting up a Silo workspace

    AJ Nash demonstrates how to set up anonymous online research session to avoid tracking and simulate local access from other countries. He guides you through setting up an ISP to appear as if you're browsing from Serbia using a Mac and Safari. He also shows you how to access and interpret local content as part of your research. Learn how quick and easy it is to obfuscate your location for security and accurate research.

    Watch Now
    Video
    Video

    The Intel Drop | Bypassing geoblocking with Silo

    AJ demonstrates how to bypass geo restrictions using Silo, ensuring uninterrupted research regardless of your location.

    Watch Now
    Close
    Close