Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now
Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more

All resources

    Reset
    Navigating the Ransomware Negotiation Landscape
    podcast-icon
    Podcast

    E101 | Navigating the Ransomware…
    E101 | Navigating the Ransomware Negotiation Landscape

    Listen
    Video
    Video

    Stop brand sabotage | Intel Drop

    Brand sabotage is a growing threat that weaponizes the trust companies work hard to build. In this video, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how phishing, counterfeiting, and coordinated disinformation campaigns damage reputations and impact revenue — and why traditional brand protection often reacts too late.

    Watch Now
    Video
    Video

    The counter-reconnaissance gap: how attackers research your organization | Intel Drop

    AJ Nash explains how modern cyberattacks are won through reconnaissance long before initial access, with attackers mapping infrastructure, targeting privileged accounts, and leveraging OSINT to strike with precision. Citing CrowdStrike data showing breakout times as low as 48 minutes (and even 51 seconds), he warns that defenders are often racing the clock after attackers already have a head start. He outlines how OSINT red teaming and counter-reconnaissance can help organizations shift from reactive defense to becoming “moving hardened objectives.”

    Watch Now
    Best Practices For Open-Source Investigations
    podcast-icon
    Podcast

    E100 | Best Practices For Open-Source…
    E100 | Best Practices For Open-Source Investigations

    Listen
    Video
    Video

    Investigating a breach without alerting the attacker | Intel Drop

    AJ Nash explains why discovering a breach can shift advantage to attackers, citing CrowdStrike data showing breakout times as low as 48 minutes—and even 51 seconds. He argues that response plans must account for sophisticated adversaries who, once alerted, may deploy secondary payloads, destroy forensic evidence, or escalate. Nash outlines “the quiet pursuit”: keeping investigative activity isolated from production systems, making research appear to originate outside the compromised network, and maintaining an internal audit trail, so teams can gather intelligence and respond decisively without triggering escalation.

    Watch Now
    Video
    Video

    Building an intelligence-driven SOC | Intel Drop

    Join AJ Nash in this Intel Drop episode as he dives into building an intelligence-driven SOC. Despite significant investments in tools and technologies, many organizations remain reactive due to the lack of planning and direction in their intelligence cycles. AJ discusses the importance of defining leadership decisions and intelligence requirements to create truly effective cybersecurity operations.

    Watch Now
    Video
    Video

    The season of predictions: Are they useful? | The Intel Drop

    In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

    Watch Now
    Skull made of binary code beside colorful audio waveform bars, split diagonally on a dark background.
    podcast-icon
    Podcast

    E99 | Exploring the Dark Web: Myths and…
    E99 | Exploring the Dark Web: Myths and Realities

    Listen
    Great Wall of China
    podcast-icon
    Podcast

    E98 | Navigating China's Strategic…
    E98 | Navigating China's Strategic Landscape

    Listen
    Close
    Close