FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Resource Type
  • Option1
  • Option2
  • Option3
Video
Video

The Silo Sessions # 18: James Kettle, Portswigger

James Kettle of Portswigger Web Security discusses an "ancient" exploit, HTTP Request Smuggling, which keeps threatening web servers and the browser

Video
Video

Silo for Research for Law Enforcement

Silo for Research can keep your online investigations compliant, anonymous and secure

Report
Report

Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms

The legal, compliance and IT departments at financial firms often have different priorities when addressing security and compliance issues

Video
Video

The Silo Sessions #16: GDPR Outlook w/ Scott Petry & Steve Durbin

Authentic8’s CEO Scott Petry and Steve Durbin, Managing Director of ISF, discuss how the EU regulators are ramping up their data protection efforts

Video
Video

The Silo Sessions #15: JavaScript Template Attacks - How Do They Work?

A local browser can be used by attackers for targeted exploits. Security researcher Michael Schwarz explains JavaScript Template Attacks and how they work

White Paper
White Paper

The Billion-Dollar Security Blanket: How Security Spending Overlooks the Biggest Risk of All

Former director on the National Security Council examines why organizations are still attacked despite massive security investment

Solution Brief
Solution Brief

Law Firms in the Digital Age

Law firms face a delicate balance — securing their assets and complying with client audit requirements while ensuring employees stay connected and engaged

Video
Video

Digital Trends Live: Apple WWDC wrap-up, Congress may investigate big tech

Scott Petry, CEO and co-founder of Authentic8, talks about development of a cloud-based web-browsing that protects users from harmful malware

Close
Close