Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now
Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more

All resources

    Reset
    Success Story
    Success Story

    Location, location, location: helping SOC investigate region-specific malware

    Manufacturer’s SOC uses regional egress nodes to prevent getting blocked while investigating region-specific malware.

    Read more
    Success Story
    Success Story

    “Good morning sir, I’m with the FBI” social media analyst gets home visit from feds

    A social media company’s trust and safety analyst receives a surprise visit from the FBI after participating in terrorism-related online chats and forums.

    Read more
    Data Sheet
    Data Sheet

    Silo for Research Analyst Pack

    A suite of productivity enhancement features for analysts including Collecter and Gofer.

    Read more
    Success Story
    Success Story

    Online payment platform investigates threats to their brand and reputation

    An online payment platform’s brand reputation agents needed secure, anonymous access to websites, social media and local sources to effectively follow up on suspicious activity and threat reports

    Read more
    Success Story
    Success Story

    You’ve been swatted: tech company analysts bear the brunt of online retaliation

    A major tech company’s trust and safety analysts experienced retaliation from investigation targets due to improper attribution management. 
     

    Read more
    Success Story
    Success Story

    City government investigates threats, collaborates with other agencies

    The SOC team of a major U.S. city government conducts complete, detailed investigations, collecting evidence to share with site owners and law enforcement with the help of Silo for Research.

    Read more
    Webinar
    Webinar

    Out in the open: automation of OSINT for CTI

    Learn when and how to automate OSINT data collection. Real-life examples of how automation can reduce speed time-to-resolution.

    Solution Brief
    Solution Brief

    State and local government

    Learn why dozens of the most at-risk government agencies in the U.S. rely on Silo for Research to conduct secure and anonymous online investigations.

    Read more
    Infographic
    Infographic

    Is the hunter becoming the hunted?

    Findings from the February 2021 survey of 100+ state and local law enforcement detectives, investigators and intelligence/crime analysts reveal risks of conducting investigations online.

    Read more
    Close
    Close