Meet Us at the FS-ISAC Virtual Summit May 19-20

FS-ISAC Virtual Summit, Authentic8 virtual booth – May 19-20: Meet the team behind Silo for Research (Toolbox) and Silo for Safe Access (Cloud Browser).
The post Meet Us at the FS-ISAC Virtual Summit May 19-20 appeared first on Security Boulevard.
Continue reading Meet Us at the FS-ISAC Virtual Summit May 19-20

Top Reviews for Authentic8 Silo

Silo for Research (Toolbox) gets top reviews in the Threat Intelligence Software category. Read here what Authentic8 customers say Silo:
The post Top Reviews for Authentic8 Silo appeared first on Security Boulevard.
Continue reading Top Reviews for Authentic8 Silo

How OSINT Benefits Cyber Threat Intelligence

We asked cyber threat intelligence veteran Jake Williams, SANS instructor and president/founder of Rendition Infosec, in this video. (Authentic8 Blog)
The post How OSINT Benefits Cyber Threat Intelligence appeared first on Security Boulevard.
Continue reading How OSINT Benefits Cyber Threat Intelligence

Web Isolation with Authentic8 & Silo at RSA 2020

This year’s RSA conference in San Francisco offers various opportunities to meet Authentic8 (booth #2264) and learn about its Silo web isolation platform.
The post Web Isolation with Authentic8 & Silo at RSA 2020 appeared first on Security Boulevard.
Continue reading Web Isolation with Authentic8 & Silo at RSA 2020

How to REALLY Browse Anonymously

When anonymous web access becomes business-critical, the web’s favorite home remedies won’t help. Worse, some methods and browser plugins will actually harm your organization.
The post How to REALLY Browse Anonymously appeared first on Security Bouleva… Continue reading How to REALLY Browse Anonymously

10 Top Tools for Threat Hunters from Black Hat USA 2019

Ten short reviews of useful tools for OSINT analysts and threat hunters presented at Black Hat USA 2018 for pentesting, forensics, online investigations, phishing simulation, and more.
The post 10 Top Tools for Threat Hunters from Black Hat USA 2019 ap… Continue reading 10 Top Tools for Threat Hunters from Black Hat USA 2019