Everything you ever wanted to know about how Silo can give you control.
SEC Compliance and the Internet
This interview with Jane Jarcho, former SEC OCIE deputy director, explores key issues for investment management firms.
VPN for Secure and Private Web Access? Think Again.
Find out what it takes to ensure cybersecurity and anonymity online, and why Silo, the secure cloud browser has your back where VPN doesn't.
Silo for Safe Access
Dangerous organizations and people operate in the shadows. If you are going to find them online, you have to go on the Dark Web.
Local Browsers: High-risk Holdover from IT's Past
From data aggregation and market analysis software packages, to buy side / sell side trading programs, and to risk management, compliance and IT security solutions, essential functions have migrated to browser-centric web services and cloud apps.
Cloud-Base Research Platform for Threat Hunters
Learn how to apply threat intelligence and use dark web visibility to reduce risk within your organization.
Why Cyber Threat Intelligence Researchers Need Access to the Dark Web
Learn about various data sets at the open, deep, and dark web that help cyber threat intelligence and open-source intelligence (OSINT) researchers.
Law Enforcement in the Digital Age
Collect social media and dark web evidence anonymously and in compliance.
Silo for Research (Toolbox)
Any open source intelligence collection process starts with the browser. Researchers need a stealthy browser. Read how Silo Research Toolbox helps.
Enabling Mission Success Regardless of Location
During a worldwide pandemic, a U.S. Government agency rapidly enables analysts to conduct OSINT research remotely using Silo for Research (Toolbox).
Case Study: Global Top Ten Financial Services Firm
See how Authentic8 helps identify threats and fraudsters online.
Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms
Why compliance, IT and legal must restore trust and get into sync
CIO Guide: Rapidly Enabling Remote Workers in Time of Crisis
The five steps to quickly enabling remote workers in times of crisis: A guide for CIOs and CISOs.
The Next Evolution of Cyber Threat Intelligence
Learn more about the future of investigation platforms, data collectors, machine learning and regulations of how to handle data.
Anonymous Customer Case Study
How a military unit simultaneously increased network access and decreased cyber risk
How to Use OSINT for Cyber Threat Intelligence Investigations
Learn about the current landscape around cyber threat intelligence and open-source intelligence (OSINT).
Challenges in the Browser & Securing Web Session
Authentic8 CEO Scott Petry speaks to Business Security Weekly.
Remote Workers: Security and Control in a Zero Trust World
From traveling executives to work-from-home employees, IT needs to assert positive control over their compute environment.
Evolution of Virtual Web Browsing
Digital Trends interview with Authentic8 CEO Scott Petry (1:10:33 into video).
Rapidly Enabling Remote Workers in a Fed Workforce
A U.S.Government agency provides remote workers with secure access to web browsing and O365 to continue day-to-day operations during a global health crisis.
Immediate Government Work Remote Solution
Silo for Safe Access helps agencies comply with the U.S. Government telework mandates due to the COVID-19 Coronavirus.
Cyber Threat Intelligence Report 2020, Cybersecurity Insiders
Download the startling findings from the 2020 Cyber Threat Intelligence Report, based on a survey among 338 CTI analysts and practitioners and published by market research firm Cybersecurity Insiders.
Use Case: Enabling Remote Work for the DoD
Silo is proving to be the special solution of choice for discriminating leaders, operators, and security professionals in the U.S. military.
How to Use Pastebin for Threat Research
Quick Guide: How can threat researchers leverage Pastebin to find hackers who are offering leaked data for sale?
Silo by Authentic8 Web Isolation Platform
Web Isolation with Silo enables anyone, anywhere, on any device, to use the web without risk. The world’s most security-sensitive organizations rely on Silo.
How to Track Crypto Money Laundering?
Money laundering with cryptocurrency is on the rise and creates new challenges for AML investigators. Blockchain technology can help track the transactions.
How to Investigate Website Ownership
How to research website ownership and history - who’s behind it, hosting, maintenance, funding… Get in-depth details using proper research tools and tradecraft
How to Track Online Drug Dealers
Tools and tips for law enforcement investigators who use Silo for Research to safely and anonymously investigate and track drug trade-related social media activities.
Infographic: Cyber Threat Intelligence Trends
Infographic: Cyber Threat Intelligence Trends - a 2020 survey highlights a shocking lack of training, tools, and oversight for researchers and analysts.
What is Shodan?
This Flash Report provides an overview of Shoan, a search engine for internet-connected devices, and explains how IoT search with Shodan works.
OSINT Academy: Tradecraft Training
Available exclusively to Silo for Research customers, OSINT Tradecraft Training (T2) provides online courses for Open Source Intelligence professionals.
What is Exif Data?
How to extract and analyze Exchangeable Image File Format (Exif) data? This tutorial explains how to examine Exif data for threat intelligence research.
Zero Trust & Unmanaged Devices
In the webinar, Extending the Zero Trust Framework to Unmanaged Devices, Forrester VP and Principal Analyst Chase Cunningham and Ramesh Rajagopal, Authentic8's Co-Founder and President, offer practical advice for implementing a Zero Trust framework to cover unmanaged devices.
21 OSINT Research Tools for Threat Intelligence
A list of the 21 most useful tools for OSINT investigations of the open, deep and dark web. The quick guide explains each tool and highlights the use case.
Authentic8 Helps Registrar with ICANN Compliance
This internet domain registrar is using Silo for Research (Toolbox) to securely investigate suspicious activities and abuse to accordance with ICANN.
Open and Dark Web Research: Tips and Techniques Booklet
How to conduct OSINT investigations online? Authentic8’s booklet ‘Open and Dark Web Research: Tips and Techniques’ highlights top tools and methods.
Guide to Secure Fraud Investigations
How to reduce cybersecurity risk and costs associated with fraud Investigations online through web Isolation? Read this Authentic8 whitepaper.
OSINT Academy: Fast-track Your Analyst Career
Ready to learn from the best? This quick video introduction shows how the OSINT Academy provides tangible results for your missions and your analyst career, including professional certification.