All Posts

Show
SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks
July 23, 2019 read more

Moar Sand!

March 10, 2016

Let’s face it, many organizations have their heads in the sand. In some cases this choice is a deliberate one; …

read more

Uncertainties in the Language of Uncertainty – and why we need to talk about it

February 25, 2016

If you know much about Digital Shadows SearchLight, you would know that one of our strengths in the provision of …

read more

Intelligence vs. Infosec: The 3-letter-guy to the rescue?

February 25, 2016

Whenever Royal Marines deploy on operations, they take with them their own intelligence analysts. These analysts are fully trained and …

read more

From cyber espionage to hacker marketing strategies: an overview of Digital Shadows talks at RSA Conference

February 25, 2016

It’s not long until this year’s RSA Conference, and Digital Shadows will be in full force, with some of us …

read more

WHAT DO YOU MEAN IT WAS AN ACCIDENT?

February 25, 2016

We always want to find someone or something to pin the blame on when a serious data breach occurs.  But is it really that simple?

read more

The ‘hacker’ talent shortage: What organizations can learn from the recruitment efforts of their attackers

February 24, 2016

The seventh annual (ISC)² Global Workforce Survey estimates that there will be a shortage of information security professionals by 2020. Ask …

read more

Using News Reports as a Source of Intelligence

February 23, 2016

It’s often tempting to overplay the importance of exploring dark and deep web sources in providing intelligence value. However, there’s …

read more

OpOlympicHacking: A hurdle for Rio’s sponsors to vault

February 22, 2016

This month Anonymous Brazil and an affiliate group, known as ASOR Hack Team, announced the launch of the hacktivist operation, …

read more

Why Go Through the Trouble to Tumble?

February 17, 2016

Today you can purchase a pizza in Berlin and pay for it from a digital wallet located on a computer …

read more

Another SANS Cyber Threat Intelligence Summit is in the books

February 11, 2016

Last Thursday we wrapped up the 4th annual SANS Cyber Threat Intelligence (CTI) Summit. I have presented at all four …

read more