Company

Show
SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks
July 23, 2019

Since founding the company in 2011, we’ve had some memorable milestones: from the first release of SearchLight in 2014, to …

read more

Third Party Risk: 4 ways to manage your security ecosystem

January 16, 2020

  The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can …

read more

Top Security Blogs of 2019 from Digital Shadows

December 20, 2019

  As we approach the end of 2019, we wanted to share some of the most popular security trends and …

read more

2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

December 18, 2019

  If all the holiday fuss isn’t reminder enough, 2020 is almost upon us. 2019 was an unusual year in …

read more

Threat Intelligence: A Deep Dive

December 12, 2019

  Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a …

read more

Asset Inventory Management: Difficult But Essential

November 27, 2019

  If it’s one thing that most security professionals can agree on, it’s that asset inventories are one of the …

read more

BSidesDFW 2019: OSINT Workshop Recap

November 18, 2019

  A few Saturdays ago, we had the pleasure of presenting at BSidesDFW in Fort Worth, Texas. We were all …

read more

Combatting Domain-Centric Fraud: Why Mimecast is partnering with Digital Shadows

November 7, 2019

This is a guest blog, authored by Matthew Gardiner, Director of Enterprise Security Campaigns at Mimecast Domain fraud is a widespread …

read more

Your Cyber Security Career – Press start to begin

October 30, 2019

  October was Cyber Security Awareness month, and as a follow-up, I thought it would be good  to talk about …

read more

Singapore Cyber Threat Landscape report (H1 2019)

September 26, 2019

Despite being the second smallest country in Asia, Singapore is a global financial and economic hub. On top of this, …

read more

Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ

September 10, 2019

Back in February, I wrote about how we avoid the term “eat your own dog food” here at Digital Shadows, …

read more