Everything you ever wanted to know about how Silo can give you control.
2020 Global Financial Crime Survey Investigations Report
See findings of the Authentic8-ACFCS financial crime investigations survey, highlighting the issues around the investigative function and productivity
Maximize Threat Intelligence to Maximize Your SOC
Featuring Forrester Sr Analyst Brian Kime, learn best practices for mitigating risks while maximizing SOC investments.
Financial Fraud Investigators: Tips & Techniques Booklet
Keep your online financial fraud and AML research secure and anonymous across the open, deep and dark web.
Election Security: Defending our Democracy against Well-Resourced Adversaries
Election security concerns paint the headlines. Our most formidable adversaries are well-resourced with concerning intent and capabilities: malign influence and false messaging, potential attacks on voter registration and election systems, and even targeting campaigns.
How to Track Online Drug Dealers
Tools and tips for law enforcement investigators who use Silo for Research to safely and anonymously investigate and track drug trade-related social media activities.
What is Exif Data?
How to extract and analyze Exchangeable Image File Format (Exif) data? This tutorial explains how to examine Exif data for threat intelligence research.
What is Shodan?
This Flash Report provides an overview of Shoan, a search engine for internet-connected devices, and explains how IoT search with Shodan works.
OSINT Academy: Tradecraft Training
Available exclusively to Silo for Research customers, OSINT Tradecraft Training (T2) provides online courses for Open Source Intelligence professionals.
Cyber Threat Intelligence Report 2020, Cybersecurity Insiders
Download the startling findings from the 2020 Cyber Threat Intelligence Report, based on a survey among 338 CTI analysts and practitioners and published by market research firm Cybersecurity Insiders.
How to Use Pastebin for Threat Research
Quick Guide: How can threat researchers leverage Pastebin to find hackers who are offering leaked data for sale?
Rapidly Enabling Remote Workers in a Federal Workforce
A U.S.Government agency provides remote workers with secure access to web browsing and O365 to continue day-to-day operations during a global health crisis.
VPN for Secure and Private Web Access? Think Again.
Find out what it takes to ensure cybersecurity and anonymity online, and why Silo, the secure cloud browser has your back where VPN doesn't.
Cloud-Base Research Platform for Threat Hunters
Learn how to apply threat intelligence and use dark web visibility to reduce risk within your organization.
Local Browsers: High-risk Holdover from IT's Past
From data aggregation and market analysis software packages, to buy side / sell side trading programs, and to risk management, compliance and IT security solutions, essential functions have migrated to browser-centric web services and cloud apps.
Evolution of Virtual Web Browsing
Digital Trends interview with Authentic8 CEO Scott Petry (1:10:33 into video).
Law Enforcement in the Digital Age
Collect social media and dark web evidence anonymously and in compliance.
Challenges in the Browser & Securing Web Session
Authentic8 CEO Scott Petry speaks to Business Security Weekly.
Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms
Why compliance, IT and legal must restore trust and get into sync
How to Use OSINT for Cyber Threat Intelligence Investigations
Learn about the current landscape around cyber threat intelligence and open-source intelligence (OSINT).
Why Cyber Threat Intelligence Researchers Need Access to the Dark Web
Learn about various data sets at the open, deep, and dark web that help cyber threat intelligence and open-source intelligence (OSINT) researchers.
The Next Evolution of Cyber Threat Intelligence
Learn more about the future of investigation platforms, data collectors, machine learning and regulations of how to handle data.
Enabling Mission Success Regardless of Location
During a worldwide pandemic, a U.S. Government agency rapidly enables analysts to conduct OSINT research remotely using Silo for Research (Toolbox).
Infographic: Cyber Threat Intelligence Trends
Infographic: Cyber Threat Intelligence Trends - a 2020 survey highlights a shocking lack of training, tools, and oversight for researchers and analysts.
Zero Trust & Unmanaged Devices
In the webinar, Extending the Zero Trust Framework to Unmanaged Devices, Forrester VP and Principal Analyst Chase Cunningham and Ramesh Rajagopal, Authentic8's Co-Founder and President, offer practical advice for implementing a Zero Trust framework to cover unmanaged devices.
21 OSINT Research Tools for Threat Intelligence
A list of the 21 most useful tools for OSINT investigations of the open, deep and dark web. The quick guide explains each tool and highlights the use case.
Open and Dark Web Research: Tips and Techniques Booklet
How to conduct OSINT investigations online? Authentic8’s booklet ‘Open and Dark Web Research: Tips and Techniques’ highlights top tools and methods.
OSINT Academy: Fast-track Your Analyst Career
Ready to learn from the best? This quick video introduction shows how the OSINT Academy provides tangible results for your missions and your analyst career, including professional certification.
Remote Workers: Security and Control in a Zero Trust World
From traveling executives to work-from-home employees, IT needs to assert positive control over their compute environment.
How to Investigate Website Ownership
How to research website ownership and history - who’s behind it, hosting, maintenance, funding… Get in-depth details using proper research tools and tradecraft
Crypto Money Laundering on the Rise
Money laundering with cryptocurrency is on the rise and creates new challenges for AML investigators. Blockchain technology can help track the transactions..
Guide to Secure Fraud Investigations
How to reduce cybersecurity risk and costs associated with fraud Investigations online through web Isolation? Read this Authentic8 whitepaper.
CIO Guide: Rapidly Enabling Remote Workers in Time of Crisis
The five steps to quickly enabling remote workers in times of crisis: A guide for CIOs and CISOs.
Anonymous Customer Case Study
How a military unit simultaneously increased network access and decreased cyber risk
Case Study: Global Top Ten Financial Services Firm
See how Authentic8 helps identify threats and fraudsters online.
Enabling Remote Work for Discriminating Professionals
Silo is proving to be the special solution of choice for discriminating leaders, operators, and security professionals in the U.S. military.
Authentic8 Helps Registrar with ICANN Compliance
This internet domain registrar is using Silo for Research (Toolbox) to securely investigate suspicious activities and abuse to accordance with ICANN.
Immediate Government Work Remote Solution
Silo for Safe Access helps agencies comply with the U.S. Government telework mandates due to the COVID-19 Coronavirus.
Using Genymotion's Android Virtual Machine and Email Addresses for Social Media Account Discovery
Discover social media accounts with Genymotion.
Silo by Authentic8 Web Isolation Platform
Web Isolation with Silo enables anyone, anywhere, on any device, to use the web without risk. The world’s most security-sensitive organizations rely on Silo.
Silo for Safe Access
Dangerous organizations and people operate in the shadows. If you are going to find them online, you have to go on the Dark Web.
Silo for Research (Toolbox)
Any open source intelligence collection process starts with the browser. Researchers need a stealthy browser. Read how Silo Research Toolbox helps.
The Billion-Dollar Security Blanket: How Security Spending Overlooks the Biggest Risk of All
Matt Ashburn, a former director on the National Security Council, examines why organizations are still getting attacked – often using rather low-tech methods, like phishing, to penetrate their networks.
Top Challenges for Financial Crime Investigators
A survey of 500+ financial crime investigators reveals a lack of proper tools that affects their ability to conduct investigations online, putting their organizations at risk.
Cyber Threat Intelligence: Tools, Tips, and Tricks Handbook for Threat Hunters
Learn the latest tools, tips and tricks to access and analyze suspicious content anonymously.
SANS Threat Hunting Survey Report
An in-depth look at how teams improve threat hunting skills, where they hunt, how they hunt, and how to measure success.
SEC Compliance and the Internet
This interview with Jane Jarcho, former SEC OCIE deputy director, explores key issues for investment management firms.