Risk and Compliance

Detecting Exposed Company Data: The What, Why, and How
March 12, 2019

What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be …

read more

The Iowa Caucus: Third-Party Apps Can Be Risky Business

February 6, 2020

  If you’ve seen HBO’s Silicon Valley, then you’re familiar with the epic fails endured by the Pied Piper team. …

read more

NSA Vulnerability Disclosure: Pros and Cons

January 15, 2020

  On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix …

read more

CVE-2019-19781: Analyzing the Exploit

January 14, 2020

  On December 17th 2019, CVE-2019-19781 was disclosed. The vulnerability allows for directory traversal and remote code execution on Citrix …

read more

Dynamic CVVs: 2FA 2Furious

November 12, 2019

  The security community is quick to highlight the benefits of two-factor authentication (2FA) when it comes to something like …

read more

WiFi Security: Dispelling myths of using public networks

October 23, 2019

We have all seen many articles, blogs, endless Twitter commentary, and so on about the risks of using public WiFi …

read more

Announcing Digital Shadows’ ISO27001 certification

May 7, 2019

I’m pleased to announce that Digital Shadows has recently achieved an important compliance milestone for our customers. After a concerted …

read more

Reducing your attack surface

April 9, 2019

What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could …

read more

How to Secure Your Online Brand

March 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

Understanding Digital Risk Protection

February 8, 2019

There has been a lot of talk recently about Digital Risk and Digital Risk Protection. Forrester published their 2018 New …

read more

You’ve got a digital strategy, but how are you managing digital risks?

February 7, 2019

Download a free copy of Digital Risk: The C-Suite‘s Critical Missing Part of Overall Risk Most C-level executives I speak …

read more

The Most Popular Security Blog Topics of 2018

December 18, 2018

It’s been a busy year on the Digital Shadows blog, with almost 150 blogs published since January 1. As we …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

November 15, 2018

VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who …

read more

Cyber Security Awareness Month: Week 4 – Privacy

October 25, 2018

This week in Brussels, Apple’s chief executive Tim Cook somewhat surprisingly castigated how personal data is handled by businesses and …

read more

Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

July 17, 2018

“Digital Shadows leads the pack for digital risk protection providers.” Digital Shadows’ customers have been telling us this for years, …

read more

Reducing Your Attack Surface: From a Firehose to a Straw

July 5, 2018

What is Attack Surface Reduction? Attack Surface Reduction is a powerful tool used to protect and harden environments. It’s a …

read more

7 Ways The Digital Risk Revolution Changes Risk and Compliance – Webinar Key Insights

May 30, 2018

Lockpath’s Vice President of Development Tony Rock and I recently conducted a webinar titled “7 Ways the Digital Risk Revolution …

read more

A New Approach for Channel Security Consultants

May 22, 2018

Old school security practices simply don’t fit the new IT environment.  Cloud computing, applications and distributed workforces have changed the …

read more

Protecting Your Brand: Return on Investment

February 27, 2018

Last week I was joined by Brett Millar, Director of Global Brand Protection for Fitbit, for a webinar on “Protecting …

read more

Why Marketing Leaders Must Take Action To Manage Digital Risk And Protect Their Brand

January 30, 2018

I am one of you. I have been in the marketing field for more than 20 years and have seen …

read more

Data Privacy Day: 8 Key Recommendations for GDPR Readiness

January 26, 2018

This Sunday is Data Privacy Day, “an international effort held annually on January 28th to create awareness about the importance …

read more

Don’t Rely on One Star to Manage Digital Risk, The Key is Total Coverage

January 16, 2018

This post originally appeared on SecurityWeek.com.  Vince Lombardi, one of the greatest coaches of all time said, “The achievements of …

read more

Why All Companies, CEO, CFO, CLO, and Board of Directors Should Require Digital Risk Management to Mitigate Corporate Risk

January 10, 2018

Cyber attacks on businesses are now weekly news as breaches of data are announced regularly. However, until recently many corporate …

read more

GDPR: Why You Need to Consider the Personal Data That Lies Outside of Your Organization

January 4, 2018

In 2010, reports emerged that the Information Commissioners’ Office (ICO) could now fine organizations up to £500,000 ($677,000) under the …

read more

GDPR – Not Just a European Concern

November 20, 2017

This post originally appeared on SecurityWeek. The recent Equifax breach that has been all over the news raises an interesting question: …

read more

Why “Have a Safe Trip” Is Taking On Greater Meaning

November 14, 2017

This post originally appeared on SecurityWeek. Have a safe trip! Typically, when we wish someone well before they leave on a …

read more

Know Where to Find Your Digital Risk

November 10, 2017

This post originally appeared on SecurityWeek. Read more from CEO Alastair Paterson. Approximately 250 years ago Samuel Johnson said, “The next …

read more

The 3 Pillars of Digital Risk Management: Part 3 – The Top 5 Main Risks of Reputational Damage

April 27, 2017

In this 3-part blog series, we discuss how each of the 3 pillars, Cyber Threat, Data Leakage, and Reputational Damage, …

read more

The 3 Pillars of Digital Risk Management: Part 2 – The 6 Main Areas That Contribute to Data Leakage Risks

April 18, 2017

In this 3-part blog series, we discuss how each of the 3 pillars, Cyber Threat, Data Leakage, and Reputational Damage, …

read more

The 3 Pillars of Digital Risk Management: Part 1 Understanding Cyber Threats

April 13, 2017

What is Digital Risk Management? The National Institute of Standards and Technology (NIST) defines the field of risk management as: …

read more

Monitoring the Mobile Threat Landscape

April 4, 2017

The UK’s National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) released a joint paper on the cyber …

read more

5 Risks Posed By Mobile Applications That SearchLight Helps You Manage

March 14, 2017

Organizations face a wide range of risks online, including cyber threats, data leakage and reputational damage. (You can learn more …

read more

Combatting Online Crime With “Needle-Rich Haystacks”

October 18, 2016

At Digital Shadows our analyst team is responsible for providing both tactical situational awareness and broader, strategic awareness to our …

read more

Digital Risk Monitoring Is A Service, Not a Distinct Capability

October 11, 2016

Digital Shadows was recently recognized as a leader in the Forrester Wave on Digital Risk Monitoring. Digital risk monitoring is …

read more

Digital Risk Monitoring Can Negate ‘Indicators of Exhaustion’

September 26, 2016

When I first joined Digital Shadows in January, I wrote about the current state of threat intelligence and how “Indicators …

read more

Are you certain you know what risk means?

May 31, 2016

You’re the person in charge of safety on the Titanic. The designers have told you that this state-of-the-art ship is …

read more

Moar Sand!

March 10, 2016

Let’s face it, many organizations have their heads in the sand. In some cases this choice is a deliberate one; …

read more

Relevance: The missing ingredient of cyber threat intelligence

February 8, 2016

Today we’ve announced the closing of our Series B investment round, led by Trinity Ventures. This $14 million will give …

read more

How the Internet of Things (IoT) is Expanding Your Digital Shadow

September 9, 2015

The Internet of Things (IoT) is a development that is the direct result of objects, technology, people that have been …

read more