Category: Product

Product

Strategic Threat Intelligence and You: What Does It All Mean?

October 14, 2021 | 4 Min Read

What is strategic threat intelligence? In another blog about tactical threat intelligence, we talked about how tactical and strategic threat intelligence complement each other. Tactical...
Strategic Threat Intelligence and You: What Does It All Mean?

Strategic Threat Intelligence and You: What Does It All Mean?

October 14, 2021 | 4 Min Read

What is strategic threat intelligence? In another blog about tactical threat intelligence, we talked about how tactical and strategic threat...
Tactical Threat Intelligence and You: What Does It All Mean?

Tactical Threat Intelligence and You: What Does It All Mean?

September 29, 2021 | 5 Min Read

What is tactical threat intelligence? If threat intelligence is the umbrella, within that umbrella lies strategic and tactical intelligence, next...
Enhance Executive Protection with SocialMonitor

Enhance Executive Protection with SocialMonitor

September 14, 2021 | 3 Min Read

Today we’re announcing the release of SocialMonitor, an industry-leading capability to better protect executives from social media impersonation. Read on...
SearchLight Leads the Digital Risk Protection Market

SearchLight Leads the Digital Risk Protection Market

September 10, 2021 | 3 Min Read

Since the Digital Risk Protection market was first defined in 2017, there have been a growing number of providers and...
Leveraging Digital Shadows’ Premium Services

Leveraging Digital Shadows’ Premium Services

August 18, 2021 | 3 Min Read

The state of threat intelligence today is a dynamic, ever-changing threat landscape coupled with a global shortage of a skilled...
SearchLight Reduces Domain Triage by 75%

SearchLight Reduces Domain Triage by 75%

July 21, 2021 | 5 Min Read

If you’re curious on domain monitoring, our Domain Monitoring Solutions Guide can give you a breakdown of the most common...
Key Findings from our Dark Web Monitoring Webinar

Key Findings from our Dark Web Monitoring Webinar

June 16, 2021 | 3 Min Read

A few weeks ago, we hosted a webinar on Dark Web Monitoring. I was taken aback that, even a year...
The Top 5 Dark Web Monitoring Use Cases

The Top 5 Dark Web Monitoring Use Cases

May 5, 2021 | 7 Min Read

Note: This article is an excerpt from our just-released Dark Web Monitoring Solutions Guide. You can get a free copy...
Tracking Ransomware within SearchLight

Tracking Ransomware within SearchLight

April 29, 2021 | 4 Min Read

“If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful...
Digital Shadows and XSOAR Powering Automation

Digital Shadows and XSOAR Powering Automation

April 26, 2021 | 5 Min Read

So you’ve got some threat intelligence here, firewall logs, XDR logs, logs from there, alerts from there, digital risk information...
Applying MITRE ATT&CK to your CTI Program

Applying MITRE ATT&CK to your CTI Program

April 7, 2021 | 5 Min Read

In recent years, there’s been an industry-wide movement to look more externally to predict, prevent, and adapt to threats. This...
New Release: Actionable Threat Intelligence with SearchLight

New Release: Actionable Threat Intelligence with SearchLight

April 6, 2021 | 4 Min Read

This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds...
Monitoring for Risks Coming From Suppliers: How SearchLight Helps

Monitoring for Risks Coming From Suppliers: How SearchLight Helps

March 18, 2021 | 4 Min Read

For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released...
How to Monitor Initial Access Broker Listings in SearchLight

How to Monitor Initial Access Broker Listings in SearchLight

February 25, 2021 | 4 Min Read

By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome,...
5 Ways to Take Action on Threat Intelligence

5 Ways to Take Action on Threat Intelligence

February 18, 2021 | 5 Min Read

The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...