Category: Product

Product

SearchLight Reduces Domain Triage by 75%

July 21, 2021 | 5 Min Read

If you’re curious on domain monitoring, our Domain Monitoring Solutions Guide can give you a breakdown of the most common techniques for domain impersonations including typosquats, combosquats,...
SearchLight Reduces Domain Triage by 75%

SearchLight Reduces Domain Triage by 75%

July 21, 2021 | 5 Min Read

If you’re curious on domain monitoring, our Domain Monitoring Solutions Guide can give you a breakdown of the most common...
Key Findings from our Dark Web Monitoring Webinar

Key Findings from our Dark Web Monitoring Webinar

June 16, 2021 | 3 Min Read

A few weeks ago, we hosted a webinar on Dark Web Monitoring. I was taken aback that, even a year...
The Top 5 Dark Web Monitoring Use Cases

The Top 5 Dark Web Monitoring Use Cases

May 5, 2021 | 7 Min Read

Note: This article is an excerpt from our just-released Dark Web Monitoring Solutions Guide. You can get a free copy...
Tracking Ransomware within SearchLight

Tracking Ransomware within SearchLight

April 29, 2021 | 4 Min Read

“If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful...
Digital Shadows and XSOAR Powering Automation

Digital Shadows and XSOAR Powering Automation

April 26, 2021 | 5 Min Read

So you’ve got some threat intelligence here, firewall logs, XDR logs, logs from there, alerts from there, digital risk information...
Applying MITRE ATT&CK to your CTI Program

Applying MITRE ATT&CK to your CTI Program

April 7, 2021 | 5 Min Read

In recent years, there’s been an industry-wide movement to look more externally to predict, prevent, and adapt to threats. This...
New Release: Actionable Threat Intelligence with SearchLight

New Release: Actionable Threat Intelligence with SearchLight

April 6, 2021 | 4 Min Read

This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds...
Monitoring for Risks Coming From Suppliers: How SearchLight Helps

Monitoring for Risks Coming From Suppliers: How SearchLight Helps

March 18, 2021 | 4 Min Read

For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released...
How to Monitor Initial Access Broker Listings in SearchLight

How to Monitor Initial Access Broker Listings in SearchLight

February 25, 2021 | 4 Min Read

By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome,...
5 Ways to Take Action on Threat Intelligence

5 Ways to Take Action on Threat Intelligence

February 18, 2021 | 5 Min Read

The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...