All Posts

Detecting Exposed Company Data: The What, Why, and How
March 12, 2019 read more

Using News Reports as a Source of Intelligence

February 23, 2016

It’s often tempting to overplay the importance of exploring dark and deep web sources in providing intelligence value. However, there’s …

read more

OpOlympicHacking: A hurdle for Rio’s sponsors to vault

February 22, 2016

This month Anonymous Brazil and an affiliate group, known as ASOR Hack Team, announced the launch of the hacktivist operation, …

read more

Why Go Through the Trouble to Tumble?

February 17, 2016

Today you can purchase a pizza in Berlin and pay for it from a digital wallet located on a computer …

read more

Cyber Situational Awareness and The Kill Chain

February 16, 2016

The concept of the cyber kill chain, in some form or another, has been around for ages. Some love it, …

read more

Another SANS Cyber Threat Intelligence Summit is in the books

February 11, 2016

Last Thursday we wrapped up the 4th annual SANS Cyber Threat Intelligence (CTI) Summit. I have presented at all four …

read more

Waiter, there’s a hole in my intelligence collection!

February 10, 2016

We’re all swimming in data. There’s data everywhere. From packet captures to reputation feeds, it feels like there is a …

read more

Relevance: The missing ingredient of cyber threat intelligence

February 8, 2016

Today we’ve announced the closing of our Series B investment round, led by Trinity Ventures. This $14 million will give …

read more

Surviving the threats posed by PoS malware

February 2, 2016

These days, you can’t go into a store or mall without being asked to use a point of sale (PoS) …

read more

“Largest cyber attack” on Israel lacks power

February 1, 2016

On 26 January, Yuval Steinitz, the Israeli Minister of Infrastructure, Energy and Water Resources, announced to the 2016 CyberTech Conference …

read more

Why I joined Digital Shadows

January 28, 2016

Departing Forrester Research wasn’t an easy decision; it was a great job. I was able to help guide the security …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive