Product

Access Our Threat Intel In Test Drive

Test Drive SearchLight Free for 7 Days
Try It Now

Connect with us

The Top 5 Dark Web Monitoring Use Cases

The Top 5 Dark Web Monitoring Use Cases

May 4, 2021 | 7 Min Read

Note: This article is an excerpt from our just-released Dark Web Monitoring Solutions Guide. You can get a free copy...
Tracking Ransomware within SearchLight

Tracking Ransomware within SearchLight

April 29, 2021 | 4 Min Read

“If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful...
Digital Shadows and XSOAR Powering Automation

Digital Shadows and XSOAR Powering Automation

April 26, 2021 | 5 Min Read

So you’ve got some threat intelligence here, firewall logs, XDR logs, logs from there, alerts from there, digital risk information...
Applying MITRE ATT&CK to your CTI Program

Applying MITRE ATT&CK to your CTI Program

April 7, 2021 | 5 Min Read

In recent years, there’s been an industry-wide movement to look more externally to predict, prevent, and adapt to threats. This...
New Release: Actionable Threat Intelligence with SearchLight

New Release: Actionable Threat Intelligence with SearchLight

April 6, 2021 | 4 Min Read

This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds...
Monitoring for Risks Coming From Suppliers: How SearchLight Helps

Monitoring for Risks Coming From Suppliers: How SearchLight Helps

March 18, 2021 | 4 Min Read

For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released...
How to Monitor Initial Access Broker Listings in SearchLight

How to Monitor Initial Access Broker Listings in SearchLight

February 25, 2021 | 4 Min Read

By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome,...
5 Ways to Take Action on Threat Intelligence

5 Ways to Take Action on Threat Intelligence

February 18, 2021 | 5 Min Read

The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...