FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Resource Type
  • Option1
  • Option2
  • Option3
Video
Video

The Next Evolution of Cyber Threat Intelligence: Structure, Training and Regulations

SANS expert Jake Williams and Authentic8’s Nick Espinoza discuss the future of investigation platforms, data collectors, and regulations on data handling

Guide
Guide

Rapidly Enabling Remote Workers in Time of Crisis

Practical advice for CIOs and CISOs on how to quickly and securely enable remote workers in time of crisis

Video
Video

Why Cyber Threat Intelligence Researchers Need Access to the Dark Web

SANS expert Jake Williams and Authentic8’s Nick Espinoza talk about where CTI researchers can find high-value data while staying secure and anonymous

Video
Video

How to Use OSINT for Cyber Threat Intelligence Investigations

SANS expert Jake Williams and Authentic8’s Nick Espinoza discuss the current landscape around cyber threat intelligence and open-source intelligence (OSINT)

Solution Brief
Solution Brief

Law Enforcement in the Digital Age

Collect social media and dark web evidence anonymously and in compliance

Video
Video

Challenges in the Browser & Securing Web Sessions

Authentic8 CEO Scott Petry speaks to Business Security Weekly on how he's used the cloud to disrupt the infosec market for nearly 20 years

Video
Video

The Silo Sessions #18: James Kettle, PortSwigger

James Kettle of PortSwigger Web Security discusses an "ancient" exploit, HTTP Request Smuggling, which keeps threatening web servers and the browser

Video
Video

Silo for Research for Law Enforcement

Silo for Research can keep your online investigations compliant, anonymous and secure

Report
Report

Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms

The legal, compliance and IT departments at financial firms often have different priorities when addressing security and compliance issues

Close
Close