Everything you ever wanted to know about how Silo can give you control.
Intro to the Dark Web, Part 1: What's Hiding in the Dark
An introductory webinar on the basics of the dark web, and why it could be a useful asset for investigators
Trust & Safety
Trust & Safety teams are tasked with keeping users safe. Silo for Research helps T&S analysts conduct secure investigations across the open, deep and dark web
Online Investigations: 5 Mistakes Putting You at Risk
Online sources can also be perilous. This guide reveals top mistakes online investigators make, and offers suggestions on how to avoid them.
Trust & Safety Teams Have a Lot to Hide
Trust and Safety teams investigate potentially harmful situations, monitor user activity, and set up policies to build an environment of trust.
Naked and Exposed: Stop Investigating Online without Managed Attribution
Managed attribution is essential to keeping online investigations secure and anonymous.
Gofer Add-On: Silo for Research
Gofer is an extension for Silo for Research that allows analysts to configure and seamlessly execute multi-search workflows.
Tradecraft Training: How to Use Dark Web for Your Investigations
A beginner level dark web investigation webinar, targeted at those who have never accessed the dark web or are just starting to use the dark web for investigations.
Silo for Research helps a U.S. Law Enforcement Agency Conduct Secure Undercover Operations
Learn why the agency chose Silo and how it quickly became one of their most essential tools for undercover investigators.
Harvester Collection Automation API - Overview
Authentic8’s Harvester Automation API enhances automated web-based collection by integrating into existing content collection workflows via a simple API.
Harvester Collection Automation API - SOC
Authentic8’s Harvester Automation API augments a SOC’s web-based collection capabilities by integrating into TIP, SIEM and SOAR collection workflows via API.
2021 Law Enforcement Handbook
A handbook to keeping your online investigations anonymous and secure. See the recommended tools and best practices.
Secure, Anonymous Online Intelligence Gathering for Federal Law Enforcement
Learn about the dangers of using a traditional web browser for law enforcement investigations and how Silo for Research can help.
Secure, Anonymous Online Intelligence Gathering for State and Local Law Enforcement
Learn about the dangers of using a traditional web browser for law enforcement investigations and how Silo for Research can help.
Anti-Money Laundering: New US Regulation to Start the Year Off
Congress passes defense bill with big ramifications for AML in 2021. This and other AML news and best practices from Compliance Week and Authentic8.
Silo for Research
Any open source intelligence collection process starts with the browser. Researchers need a stealthy browser. Read how Silo for Research helps.
Productivity Without Compromise For Financial Crime Investigations
Silo for Research provides analysts with security, anonymity and workflow capabilities to avoid investigations being compromised
Silo for Research Helps Large Regional Bank Protect Their Customers by Taking Action Against Fraud
Threat intelligence team able to proactively combat fraud
Silo for Research Helps Bank Conduct Anonymous Investigations to Comply with KYC Regulations
Fortune 500 bank AML assesses client risk profiles in line with KYC requirements
Collector Data Sheet
Collector is an automated collection module of Silo for Research that can schedule content collection in a variety of formats and in line with tradecraft best practices
Large Regional Bank Uses Silo for Research to Investigate Threats and Strengthen Security
On-demand, anonymous environment creates secure investigation space for SOC
Dark Web Add-On: Silo for Research
The add-on provides simple and safe “point and click” access to dark web content while leveraging Silo for Research's isolation, anonymity and workflow features
Managing Attribution in Online Financial Crime Investigations
Learn how to maintain anonymity while investigating financial crime online to protect researchers, their organizations and the quality of investigations
OSINT Academy for Fraud Investigators
OSINT Academy provides in-depth courses to help fraud investors stay updated on new tools and techniques to stay a step ahead of criminals
OSINT Academy for Financial Investigators
OSINT Academy’s courses enable financial investigators to stay updated on new tools and techniques to conduct secure and successful investigations
OSINT Academy for Cyber Threat Intelligence
OSINT Academy provides in-depth courses around the constantly evolving world of CTI with tools and techniques for conducting successful investigations
Solving Productivity Issues in Financial Crime Investigations
Silo for Research can improve productivity as well as quality of online investigations into financial crime and fraud across the surface and dark web
Crypto Money Laundering on the Rise
Money laundering with cryptocurrency is on the rise and creates new challenges for AML investigators. Blockchain technology can help track the transactions.
Using the Dark Web in Financial Crime Investigations
Learn how to safely conduct financial crime investigations on the dark web without disclosing identity or intent to targets
OSINT Academy: Tradecraft Training
Available exclusively to Silo for Research customers, OSINT Academy Tradecraft Training provides online courses for open-source intelligence professionals.
What's Hurting Caseload Productivity in Financial Crime Investigations?
Get the highlights from our 2020 survey on top challenges and needed solutions to improve financial crime investigations
Securing Emails of Nonprofit Community Health Center
Read how Silo for Safe Access secures email — the number-one attack vector for hospitals — for a U.S.-based community health center
We Asked, Financial Fraud Analysts Answered: Unveiling 2020 Online Research Trends
Watch the on-demand webinar covering the findings of the 2020 Global Financial Crimes Investigations Survey
OSINT Insiders On-Demand
Watch all eight OSINT Insiders episodes on demand. OSINT Insiders is a rapid-fire discussion of topics related to open-source intelligence like findings, tools and interviews.
Silo for Research Product Tour
Watch the Silo for Research Product Tour to learn how to decrease investigation time-to-insight, simplify compliance and reduce IT overhead and costs
From the Experts: Social Media Monitoring and Dark Web Investigations
Cybersecurity experts discuss the importance of threat intelligence, give advice on how to better enable intelligence-gathering investigations
2020 Global Financial Crime Survey Investigations Report
See findings of the Authentic8-ACFCS financial crime investigations survey, highlighting the issues around the investigative function and productivity
Maximize Threat Intelligence to Maximize Your SOC
Featuring Forrester Sr Analyst Brian Kime, learn best practices for mitigating risks while maximizing SOC investments.
Financial Fraud Investigators: Tips & Techniques Booklet
Keep your online financial fraud and AML research secure and anonymous across the open, deep and dark web.
Election Security: Defending our Democracy against Well-Resourced Adversaries
Election security concerns paint the headlines. Our most formidable adversaries are well-resourced with concerning intent and capabilities: malign influence and false messaging, potential attacks on voter registration and election systems, and even targeting campaigns.
How to Track Online Drug Dealers
Tools and tips for law enforcement investigators who use Silo for Research to safely and anonymously investigate and track drug trade-related social media activities.
What is Exif Data?
How to extract and analyze Exchangeable Image File Format (Exif) data? This tutorial explains how to examine Exif data for threat intelligence research.
What is Shodan?
This Flash Report provides an overview of Shoan, a search engine for internet-connected devices, and explains how IoT search with Shodan works.
Cyber Threat Intelligence Report 2020, Cybersecurity Insiders
Download the startling findings from the 2020 Cyber Threat Intelligence Report, based on a survey among 338 CTI analysts and practitioners and published by market research firm Cybersecurity Insiders.
How to Use Pastebin for Threat Research
Quick Guide: How can threat researchers leverage Pastebin to find hackers who are offering leaked data for sale?
Rapidly Enabling Remote Workers in a Federal Workforce
A U.S.Government agency provides remote workers with secure access to web browsing and O365 to continue day-to-day operations during a global health crisis.
Cloud-Base Research Platform for Threat Hunters
Learn how to apply threat intelligence and use dark web visibility to reduce risk within your organization.
Local Browsers: High-risk Holdover from IT's Past
From data aggregation and market analysis software packages, to buy side / sell side trading programs, and to risk management, compliance and IT security solutions, essential functions have migrated to browser-centric web services and cloud apps.
Evolution of Virtual Web Browsing
Digital Trends interview with Authentic8 CEO Scott Petry (1:10:33 into video).
Law Enforcement in the Digital Age
Collect social media and dark web evidence anonymously and in compliance.
Challenges in the Browser & Securing Web Session
Authentic8 CEO Scott Petry speaks to Business Security Weekly.
Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms
Why compliance, IT and legal must restore trust and get into sync
How to Use OSINT for Cyber Threat Intelligence Investigations
Learn about the current landscape around cyber threat intelligence and open-source intelligence (OSINT).
Why Cyber Threat Intelligence Researchers Need Access to the Dark Web
Learn about various data sets at the open, deep, and dark web that help cyber threat intelligence and open-source intelligence (OSINT) researchers.
The Next Evolution of Cyber Threat Intelligence
Learn more about the future of investigation platforms, data collectors, machine learning and regulations of how to handle data.
Enabling Mission Success Regardless of Location
During a worldwide pandemic, a U.S. Government agency rapidly enables analysts to conduct OSINT research remotely using Silo for Research (Toolbox).
Infographic: Cyber Threat Intelligence Trends
Infographic: Cyber Threat Intelligence Trends - a 2020 survey highlights a shocking lack of training, tools, and oversight for researchers and analysts.
Zero Trust & Unmanaged Devices
In the webinar, Extending the Zero Trust Framework to Unmanaged Devices, Forrester VP and Principal Analyst Chase Cunningham and Ramesh Rajagopal, Authentic8's Co-Founder and President, offer practical advice for implementing a Zero Trust framework to cover unmanaged devices.
21 OSINT Research Tools for Threat Intelligence
A list of the 21 most useful tools for OSINT investigations of the open, deep and dark web. The quick guide explains each tool and highlights the use case.
Open and Dark Web Research: Tips and Techniques Booklet
How to conduct OSINT investigations online? Authentic8’s booklet ‘Open and Dark Web Research: Tips and Techniques’ highlights top tools and methods.
OSINT Academy: Fast-track Your Analyst Career
Ready to learn from the best? This quick video introduction shows how the OSINT Academy provides tangible results for your missions and your analyst career, including professional certification.
Remote Workers: Security and Control in a Zero Trust World
From traveling executives to work-from-home employees, IT needs to assert positive control over their compute environment.
How to Investigate Website Ownership
How to research website ownership and history - who’s behind it, hosting, maintenance, funding… Get in-depth details using proper research tools and tradecraft
Guide to Secure Fraud Investigations
How to reduce cybersecurity risk and costs associated with fraud Investigations online through web Isolation? Read this Authentic8 whitepaper.
CIO Guide: Rapidly Enabling Remote Workers in Time of Crisis
The five steps to quickly enabling remote workers in times of crisis: A guide for CIOs and CISOs.
Anonymous Customer Case Study
How a military unit simultaneously increased network access and decreased cyber risk
Case Study: Global Top Ten Financial Services Firm
See how Authentic8 helps identify threats and fraudsters online.
Enabling Remote Work for Discriminating Professionals
Silo is proving to be the special solution of choice for discriminating leaders, operators, and security professionals in the U.S. military.
Authentic8 Helps Registrar with ICANN Compliance
This internet domain registrar is using Silo for Research (Toolbox) to securely investigate suspicious activities and abuse to accordance with ICANN.
Immediate Government Work Remote Solution
Silo for Safe Access helps agencies comply with the U.S. Government telework mandates due to the COVID-19 Coronavirus.
Using Genymotion's Android Virtual Machine and Email Addresses for Social Media Account Discovery
Discover social media accounts with Genymotion.
Silo by Authentic8 Web Isolation Platform
Web Isolation with Silo enables anyone, anywhere, on any device, to use the web without risk. The world’s most security-sensitive organizations rely on Silo.
Silo for Safe Access
Dangerous organizations and people operate in the shadows. If you are going to find them online, you have to go on the Dark Web.
The Billion-Dollar Security Blanket: How Security Spending Overlooks the Biggest Risk of All
Matt Ashburn, a former director on the National Security Council, examines why organizations are still getting attacked – often using rather low-tech methods, like phishing, to penetrate their networks.
Top Challenges for Financial Crime Investigators
A survey of 500+ financial crime investigators reveals a lack of proper tools that affects their ability to conduct investigations online, putting their organizations at risk.
Cyber Threat Intelligence: Tools, Tips, and Tricks Handbook for Threat Hunters
Learn the latest tools, tips and tricks to access and analyze suspicious content anonymously.
SANS Threat Hunting Survey Report
An in-depth look at how teams improve threat hunting skills, where they hunt, how they hunt, and how to measure success.