The Ecosystem of Phishing: From Minnows to Marlins
February 20, 2020


read more

RSA Conference 2020: CISO Tips for Making the Most of Conference Sessions

February 19, 2020

  RSA Conference is just days away, and as I have done in the past, I thought I’d suggest a …

read more

The evolving story of the Citrix ADC Vulnerability: Ears to the Ground

February 18, 2020

  The dust hasn’t quite settled on the Citrix ADC vulnerability technically known as CVE-2019-19781, and affectionately known as “Sh*&rix” …

read more

How to Operationalize Threat Intelligence: Actionability and Context

February 5, 2020

  In 1988 the idea of a Computer Emergency Response Team was first introduced at Carnegie Mellon University. Fast-forward through …

read more

Inside Digital Shadows: Davitt Potter Joins as Director of MSSP and Channels in the Americas

January 22, 2020

  I’ve spent over 25 years now in the channel supporting enterprise IT in some form or fashion.  After a …

read more

Third Party Risk: 4 ways to manage your security ecosystem

January 16, 2020

  The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can …

read more

Top Security Blogs of 2019 from Digital Shadows

December 20, 2019

  As we approach the end of 2019, we wanted to share some of the most popular security trends and …

read more

2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

December 18, 2019

  If all the holiday fuss isn’t reminder enough, 2020 is almost upon us. 2019 was an unusual year in …

read more

Threat Intelligence: A Deep Dive

December 12, 2019

  Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a …

read more

Asset Inventory Management: Difficult But Essential

November 27, 2019

  If it’s one thing that most security professionals can agree on, it’s that asset inventories are one of the …

read more

BSidesDFW 2019: OSINT Workshop Recap

November 18, 2019

  A few Saturdays ago, we had the pleasure of presenting at BSidesDFW in Fort Worth, Texas. We were all …

read more

Combatting Domain-Centric Fraud: Why Mimecast is partnering with Digital Shadows

November 7, 2019

This is a guest blog, authored by Matthew Gardiner, Director of Enterprise Security Campaigns at Mimecast Domain fraud is a widespread …

read more

Your Cyber Security Career – Press start to begin

October 30, 2019

  October was Cyber Security Awareness month, and as a follow-up, I thought it would be good  to talk about …

read more

Singapore Cyber Threat Landscape report (H1 2019)

September 26, 2019

Despite being the second smallest country in Asia, Singapore is a global financial and economic hub. On top of this, …

read more

Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ

September 10, 2019

Back in February, I wrote about how we avoid the term “eat your own dog food” here at Digital Shadows, …

read more

The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

August 19, 2019

Black Hat and DEFCON are a wrap! Digital Shadows was there in a big way this year and it was …

read more