The Ecosystem of Phishing: From Minnows to Marlins
February 20, 2020


read more

COVID-19: Companies and Verticals At Risk For Cyber Attacks

March 26, 2020

  In our recent blog, How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation, Digital Shadows highlighted some …

read more

Threat Model of a Remote Worker

March 25, 2020

  Threat models are an often discussed but sometimes nebulous term that is frequently thrown around within the cyber-security arena. …

read more

Love Where You Work – Near and Far We Celebrate Our Team

March 12, 2020

#LoveWhereYouWork Entering into 2020 felt a bit like a meteor hitting Earth for me (and I think a lot of …

read more

Want to Control Your Ever-Changing Perimeter? Focus on Integrations.

March 4, 2020

An ever changing perimeter? Over the past few years we have seen the commercial threat landscape evolve from simply combating …

read more

RSA Conference 2020: CISO Tips for Making the Most of Conference Sessions

February 19, 2020

  RSA Conference is just days away, and as I have done in the past, I thought I’d suggest a …

read more

The evolving story of the Citrix ADC Vulnerability: Ears to the Ground

February 18, 2020

  The dust hasn’t quite settled on the Citrix ADC vulnerability technically known as CVE-2019-19781, and affectionately known as “Sh*&rix” …

read more

How to Operationalize Threat Intelligence: Actionability and Context

February 5, 2020

  In 1988 the idea of a Computer Emergency Response Team was first introduced at Carnegie Mellon University. Fast-forward through …

read more

Inside Digital Shadows: Davitt Potter Joins as Director of MSSP and Channels in the Americas

January 22, 2020

  I’ve spent over 25 years now in the channel supporting enterprise IT in some form or fashion.  After a …

read more

Third Party Risk: 4 ways to manage your security ecosystem

January 16, 2020

  The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can …

read more

Top Security Blogs of 2019 from Digital Shadows

December 20, 2019

  As we approach the end of 2019, we wanted to share some of the most popular security trends and …

read more

2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

December 18, 2019

  If all the holiday fuss isn’t reminder enough, 2020 is almost upon us. 2019 was an unusual year in …

read more

Threat Intelligence: A Deep Dive

December 12, 2019

  Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a …

read more

Asset Inventory Management: Difficult But Essential

November 27, 2019

  If it’s one thing that most security professionals can agree on, it’s that asset inventories are one of the …

read more

BSidesDFW 2019: OSINT Workshop Recap

November 18, 2019

  A few Saturdays ago, we had the pleasure of presenting at BSidesDFW in Fort Worth, Texas. We were all …

read more

Combatting Domain-Centric Fraud: Why Mimecast is partnering with Digital Shadows

November 7, 2019

This is a guest blog, authored by Matthew Gardiner, Director of Enterprise Security Campaigns at Mimecast Domain fraud is a widespread …

read more