Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Data Sheet
    Data Sheet

    Silo Web Isolation Platform

    Separate the things you care about from the things you can't trust, enabling anyone, anywhere, on any device, to use the web without risk

    Read more
    Data Sheet
    Data Sheet

    Secure Browsing

    A cloud-based browsing environment that enables access to untrusted web content without introducing risk to your infrastructure

    Read more
    Flash Report
    Flash Report

    What is exif data?

    When a digital image is captured, metadata is stored as exif data, which can be useful for analysis — to find image location, camera model and more

    Read more
    Flash Report
    Flash Report

    What is Shodan?

    Get an overview of Shodan, a search engine for internet-connected devices, how it works and its uses in online investigations

    Read more
    Video
    Video

    Cyber threat intelligence survey 2020: unmasking OSINT's magnitude in CTI

    Watch Now
    Video
    Video

    The Silo Sessions #17: Interview with Troy Hunt and Scott Helme

    Watch Now
    Video
    Video

    Social media: how to quickly investigate on TikTok

    A few tips on how to use the video-sharing platform TikTok for OSINT investigations

    Watch Now
    Video
    Video

    OSINT training public records research using Authentic8 Collector

    See how to use Authentic8's Collector for efficient public record research and collection

    Watch Now
    Video
    Video

    Extending the zero trust framework to unmanaged devices

    Forrester Analyst Chase Cunningham and Authentic8's Ramesh Rajagopal offer advice for building a Zero Trust framework in the context of unmanaged devices

    Watch Now
    Close
    Close