Michael Marriott is a Senior Strategy and Research Analyst at Digital Shadows, which he joined in late 2014. Michael has a passion for security analysis and the trends they indicate, in order to better protect clients. He has written several articles and papers, and his research is regularly features in the press. He holds a BA in History and a Masters in Applied Security and Strategy, both from the University of Exeter.
Michael Marriott
Senior Strategy and Research Analyst
Recruitment Fraud in 2022
February 23, 2022 | 3 Min Read
Vulnerability Intelligence: A Best Practice Guide
January 26, 2022 | 4 Min Read
Cyber Threats to Education
January 6, 2022 | 3 Min Read
Cyber Threats to Government
December 2, 2021 | 3 Min Read
Managing your External Attack Surface with SearchLight
November 2, 2021 | 4 Min Read
What Is Intellectual Property Protection?
October 20, 2021 | 2 Min Read
What is Third Party Risk?
October 6, 2021 | 3 Min Read
Data Leakage Detection Best Practices
September 22, 2021 | 3 Min Read
Enhance Executive Protection with SocialMonitor
September 14, 2021 | 3 Min Read
Protecting Against Ransomware: What Role Does Threat Intelligence Play?
September 7, 2021 | 4 Min Read
Social Media Monitoring Best Practices
September 1, 2021 | 3 Min Read
Understanding Smishing Attacks
August 10, 2021 | 5 Min Read
Getting Started With Domain Monitoring Part 3: Remediation
July 27, 2021 | 5 Min Read
Getting Started with Domain Monitoring Part 2: Detection
July 7, 2021 | 4 Min Read
Getting Started with Domain Monitoring: Part 1, Collection
June 30, 2021 | 4 Min Read
Key Findings from our Dark Web Monitoring Webinar
June 16, 2021 | 3 Min Read
Cyber Threats to the Online Gaming Industry
June 15, 2021 | 5 Min Read
The Top Three Cybercrime Takeaways from the 2021 Verizon DBIR
June 2, 2021 | 4 Min Read
The Technology Adoption Lifecycle of Genesis Market
May 4, 2021 | 5 Min Read
Tracking Ransomware within SearchLight
April 29, 2021 | 4 Min Read
3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide
March 30, 2021 | 3 Min Read
Monitoring for Risks Coming From Suppliers: How SearchLight Helps
March 18, 2021 | 4 Min Read
How to Monitor Initial Access Broker Listings in SearchLight
February 25, 2021 | 4 Min Read
Impersonator Syndrome: Supply chain lures and COVID-19 cures
December 9, 2020 | 3 Min Read
Four Ways to Validate Credentials in SearchLight
September 29, 2020 | 3 Min Read
Cybercriminals Targeting SAP RECON
September 29, 2020 | 5 Min Read
Access Keys Exposed: More Than 40% Are For Database Stores
September 14, 2020 | 6 Min Read
Validate Exposed Credentials with Okta to Save Even More Time
August 24, 2020 | 3 Min Read
Jira Atlassian SearchLight Integration
July 21, 2020 | 2 Min Read
SearchLight’s Credential Validation: Only Focus on What Matters
July 14, 2020 | 4 Min Read
Tax Fraud in 2020: Down But Not Out
July 13, 2020 | 4 Min Read
Security Threat Intel Products and Services: Mapping SearchLight
June 10, 2020 | 6 Min Read
Asset Inventory Management: Difficult But Essential
November 27, 2019 | 4 Min Read
Nemty Ransomware: Slow and Steady Wins the Race?
September 19, 2019 | 3 Min Read
Emotet Returns: How To Track Its Updates
August 26, 2019 | 5 Min Read
Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers
July 2, 2019 | 6 Min Read
Managing Digital Risk: 4 Steps to Take
June 18, 2019 | 9 Min Read
Partnering with SecureLink to help organizations minimize their digital risk
May 15, 2019 | 3 Min Read
Reducing your attack surface
April 9, 2019 | 4 Min Read
How to Secure Your Online Brand
March 20, 2019 | 4 Min Read
Detecting Exposed Company Data: The What, Why, and How
March 12, 2019 | 3 Min Read
Understanding Digital Risk Protection
February 8, 2019 | 3 Min Read
The Most Popular Security Blog Topics of 2018
December 18, 2018 | 3 Min Read
Digital Shadows New Integration for Splunk
December 10, 2018 | 3 Min Read
Using Shadow Search to Power Investigations: Sextortion Campaigns
December 6, 2018 | 3 Min Read
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
November 15, 2018 | 2 Min Read
The Dark Web: Marketers’ Trick or Threat Intelligence Treat?
October 31, 2018 | 5 Min Read
Bank Discovers Customer Credit Card Numbers Traded Online
October 23, 2018 | 3 Min Read
Phishing Site Impersonates Financial Services Institution
October 10, 2018 | 3 Min Read
33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
October 9, 2018 | 4 Min Read
Business Email Compromise: When You Don’t Need to Phish
October 4, 2018 | 4 Min Read
10 Things You Didn’t Know You Could Do with Shadow Search™
September 25, 2018 | 5 Min Read
Online Risks to Fortnite Users
September 4, 2018 | 5 Min Read
Five Threats to Financial Services: Part Five, Hacktivism
August 15, 2018 | 5 Min Read
Five Threats to Financial Services: Part Four, Payment Card Fraud
August 14, 2018 | 6 Min Read
Cyber Threats to ERP Applications: Threat Landscape
July 24, 2018 | 4 Min Read
Five Threats to Financial Services: Banking Trojans
July 19, 2018 | 5 Min Read
How Cybercriminals are Using Messaging Platforms
June 21, 2018 | 4 Min Read
Five Threats to Financial Services: Part One, Insiders
June 19, 2018 | 5 Min Read
When There’s No Need to Hack: Exposed Personal Information
April 17, 2018 | 4 Min Read
When Sharing Is Not Caring: Over 1.5 Billion Files Exposed Through Misconfigured Services
April 5, 2018 | 4 Min Read
It’s Accrual World: Tax Return Fraud in 2018
March 7, 2018 | 5 Min Read
Protecting Your Brand: Return on Investment
February 27, 2018 | 3 Min Read
Cryptojacking: An Overview
February 13, 2018 | 5 Min Read
Four Ways Criminals Are Exploiting Interest in Initial Coin Offerings
February 1, 2018 | 5 Min Read
Another Year Wiser: Key Dates to Look Out For In 2018
January 10, 2018 | 4 Min Read
GDPR: Why You Need to Consider the Personal Data That Lies Outside of Your Organization
January 4, 2018 | 3 Min Read
Digital Shadows’ Most Popular Blogs of 2017: Analysis of Competing Hypotheses For The Win
December 12, 2017 | 3 Min Read
Fake News is More Than a Political Battlecry
November 16, 2017 | 3 Min Read
Gearing Up For National Cyber Security Awareness Month
October 3, 2017 | 4 Min Read
Fraudsters Scoring Big – an Inside Look at the Carding Ecosystem
July 18, 2017 | 3 Min Read
7 Tips for Protecting Against Account Takeovers
May 22, 2017 | 3 Min Read
The 3 Pillars of Digital Risk Management: Part 3 – The Top 5 Main Risks of Reputational Damage
April 27, 2017 | 2 Min Read
The 3 Pillars of Digital Risk Management: Part 2 – The 6 Main Areas That Contribute to Data Leakage Risks
April 18, 2017 | 2 Min Read
The 3 Pillars of Digital Risk Management: Part 1 Understanding Cyber Threats
April 13, 2017 | 3 Min Read
5 Risks Posed By Mobile Applications That SearchLight Helps You Manage
March 14, 2017 | 2 Min Read
Learning from the Top Threats Financial Services Faced in 2016
March 8, 2017 | 2 Min Read
Known Unknowns: Key Events to Keep Your Eyes Out for in 2017
January 19, 2017 | 3 Min Read
10 Ways You Can Prepare for DDoS Attacks in 2017
January 11, 2017 | 1 Min Read
Crowdsourced DDoS Extortion – A Worrying Development?
December 13, 2016 | 3 Min Read
Top 5 Threats to the Media and Broadcasting Industry
November 11, 2016 | 3 Min Read
Rocking the Vote? The Effects of Cyber Activity On The U.S. Election
October 25, 2016 | 5 Min Read
Targeting of Elections; Old News, Fresh Tactics
October 25, 2016 | 4 Min Read
New report: 97 percent of the top 1,000 companies suffer from credential compromise
September 20, 2016 | 2 Min Read
Forecasting the exploit kit landscape
September 15, 2016 | 5 Min Read
Understanding Exploit Kits’ Most Popular Vulnerabilities
September 12, 2016 | 2 Min Read
Bozkurt to Buhtrap: Cyber threats affecting financial institutions in 1H 2016
August 23, 2016 | 3 Min Read
Getting In Gear: Accounting for Tactical and Strategic Intelligence
July 26, 2016 | 3 Min Read
Three Tactics Behind Cyber Extortion
July 11, 2016 | 3 Min Read
Shining a light on the dark web
June 21, 2016 | 3 Min Read
Your money or your data: Keeping up-to-date with the innovation
June 17, 2016 | 2 Min Read
The Plan is Mightier than the Sword – Re(sources)
May 24, 2016 | 3 Min Read
The Plan is Mightier than the Sword – Persistence
May 24, 2016 | 5 Min Read
The Plan is Mightier than the Sword – Planning
May 24, 2016 | 4 Min Read
OpIcarus – Increased Claims Against Financial Institutions
May 23, 2016 | 3 Min Read
Goliath ransomware, giant problem or giant con?
May 17, 2016 | 3 Min Read
The Hacking Team breach – an attacker’s point of view
April 22, 2016 | 3 Min Read
OpIsrael: An Update
April 6, 2016 | 3 Min Read
Antifragile Security: Bouncing Back Stronger
March 21, 2016 | 3 Min Read
A Complex Threat Landscape
January 13, 2016 | 2 Min Read
TalkTalk Information Likely to be Discoverable on The Dark Web
December 4, 2015 | 3 Min Read
Crackas With Attitude: What We’ve Learned
November 23, 2015 | 3 Min Read
Smilex: Dangers of Poor OpSec
October 27, 2015 | 3 Min Read
Online Carding
October 7, 2015 | 4 Min Read