Handbook: Tools, Tips & Tricks for Threat Hunters

Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft.
The post Handbook: Tools, Tips & Tricks for Threat Hunters appeared first on Security Boulevard.
Continue reading Handbook: Tools, Tips & Tricks for Threat Hunters

Do Financial Crime Investigators Have a Bull’s Eye on their Back?

Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission?
The post Do Financial Crime Investigators Have a Bull’s Eye on their Back? appeared first on Sec… Continue reading Do Financial Crime Investigators Have a Bull’s Eye on their Back?

“Almost Like a Virtual Safe Room”

On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance
The post “Almost Like a Virtual Safe Room” appeared first on Security Boulevard.
Continue reading “Almost Like a Virtual Safe Room”

Is My Data for Sale on the Dark Web?

Is your company’s corporate network access for sale, too? Find out now. New research shows: remote work vulnerabilities have dark web marketplaces booming.
The post Is My Data for Sale on the Dark Web? appeared first on Security Boulevard.
Continue reading Is My Data for Sale on the Dark Web?

Meet Us at the FS-ISAC Virtual Summit May 19-20

FS-ISAC Virtual Summit, Authentic8 virtual booth – May 19-20: Meet the team behind Silo for Research (Toolbox) and Silo for Safe Access (Cloud Browser).
The post Meet Us at the FS-ISAC Virtual Summit May 19-20 appeared first on Security Boulevard.
Continue reading Meet Us at the FS-ISAC Virtual Summit May 19-20

Cyber Threat Intelligence: How to Use OSINT

Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What’s the recommended playbook?
The post Cyber Threat Intelligence: How to Use OSINT appeared first on Security Boulevard.
Continue reading Cyber Threat Intelligence: How to Use OSINT

Web Isolation with Authentic8 & Silo at RSA 2020

This year’s RSA conference in San Francisco offers various opportunities to meet Authentic8 (booth #2264) and learn about its Silo web isolation platform.
The post Web Isolation with Authentic8 & Silo at RSA 2020 appeared first on Security Boulevard.
Continue reading Web Isolation with Authentic8 & Silo at RSA 2020

JavaScript: How NPM Maintainer Accounts Amplify Risk

Attackers need to target only 20 specific maintainer accounts to reach more than half of the entire JavaScript npm ecosystem, security researchers warn. What’s the cybersecurity impact for the digital supply chain?
The post JavaScript: How NPM Maintain… Continue reading JavaScript: How NPM Maintainer Accounts Amplify Risk