Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    White Paper
    White Paper

    Guide to secure fraud investigations

    Reduce cybersecurity risk and costs associated with fraud Investigations online through web Isolation

    Read more
    Solution Brief
    Solution Brief

    Enable remote work on any device with full IT governance

    From traveling executives to work-from-home employees, IT needs to assert positive control over their computer environment

    Read more
    Solution Brief
    Solution Brief

    Immediate government work remote solution

    Zero Trust Application Access helps agencies comply with the U.S. government remote work mandates due to the COVID-19 pandemic

    Read more
    Flash Report
    Flash Report

    Using Genymotion’s virtual machine and email addresses for social media account discovery

    Leverage Genymotion’s Android virtual machine service and Google Contacts to identify social media accounts through the “suggested friends” function

    Read more
    Guide
    Guide

    21 OSINT research tools for threat intelligence

    Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity researchers, analysts and other security professionals

    Read more
    Flash Report
    Flash Report

    How Pastebin Can Help with Research

    Researchers can use information they find on Pastebin to locate hackers who are offering leaked data for sale

    Read more
    Guide
    Guide

    Surface and dark web research: tips and techniques

    How to access and analyze suspicious or malicious content without exposing your resources or identity

    Read more
    Infographic
    Infographic

    Top challenges for financial crime investigators

    Read more
    Data Sheet
    Data Sheet

    Collector module for Silo for Research

    An automated collection module that can schedule content collection in a variety of formats and in line with tradecraft best practices

    Read more
    Close
    Close