New Splunk Integration for Threat Hunting, Other Online Research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an investigation audit trail and limit noise in SOC.
The post New Splunk Integration for Threat Hunting, Other Online Resear… Continue reading New Splunk Integration for Threat Hunting, Other Online Research

Use the Dark Web to Enhance your Investigations – Learn How [Training Course]

The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations.
The post Use the Dark Web to Enhance your Investigations – Learn How [Training Course] appeared first on Securi… Continue reading Use the Dark Web to Enhance your Investigations – Learn How [Training Course]

Combating Malware in 2020: Process, Trends and Tools [Video]

Stay a step ahead of the adversaries planning their attack. The right framework prepares you, the latest data empowers you, and the right tools enable you.
The post Combating Malware in 2020: Process, Trends and Tools [Video] appeared first on Security… Continue reading Combating Malware in 2020: Process, Trends and Tools [Video]

How to Use Pastebin for Cyber Threat Intelligence Research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data.
The post How to Use Pastebin for Cyber Threat Intelligence Research appeared first on Security … Continue reading How to Use Pastebin for Cyber Threat Intelligence Research

Overlooked: “The Biggest Risk of All”

Global cybersecurity spending totals more than $100 billion p.a., with little effect. The Business Security Weekly podcast asked: Why?
The post Overlooked: “The Biggest Risk of All” appeared first on Security Boulevard.
Continue reading Overlooked: “The Biggest Risk of All”

Handbook: Tools, Tips & Tricks for Threat Hunters

Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft.
The post Handbook: Tools, Tips & Tricks for Threat Hunters appeared first on Security Boulevard.
Continue reading Handbook: Tools, Tips & Tricks for Threat Hunters

Do Financial Crime Investigators Have a Bull’s Eye on their Back?

Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission?
The post Do Financial Crime Investigators Have a Bull’s Eye on their Back? appeared first on Sec… Continue reading Do Financial Crime Investigators Have a Bull’s Eye on their Back?

“Almost Like a Virtual Safe Room”

On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance
The post “Almost Like a Virtual Safe Room” appeared first on Security Boulevard.
Continue reading “Almost Like a Virtual Safe Room”