FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By A8 Team July 31, 2020 1 MIN READ

Handbook: Tools, Tips and Tricks for Threat Hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.  

blog-icon
Blog
By A8 Team July 30, 2020 3 MIN READ

SPAs: attack surface-are-us

Web designers love single-page apps (SPAs) because they load quickly and conceal connection deficiencies. They are also the cause of data breaches.

blog-icon
Blog
By A8 Team July 21, 2020 5 MIN READ

Do Financial Crime Investigators Have a Bull’s Eye on Their Backs?

The COVID-19 pandemic seems like a double whammy for financial crime investigators. While online fraud has skyrocketed, teams are still adapting to a remote work environment. A recent survey among…

blog-icon
Blog
By A8 Team July 17, 2020 5 MIN READ

"Almost Like a Virtual Safe Room"

Are you following Smashing Security, the award-winning podcast with "a helpful and hilarious take on the week's tech SNAFUs" (tag line)? Check out this week's episode with Authentic8's Scott Petry.…

blog-icon
Blog
By Abel Vandegrift July 17, 2020 45 MIN READ

CMMC: Still on Track?

A landmark effort by the Department of Defense to shore up cybersecurity across its 300,000+ contractor base has managed to stay mostly on schedule despite the coronavirus pandemic. Let's take a…

blog-icon
Blog
By July 14, 2020 5 MIN READ

Is My Data for Sale on the Dark Web?

The pandemic is accelerating the move to location-distributed work. Want to know how the rush into remote work has weakened the cybersecurity posture of companies? You can find plenty of proof on…

blog-icon
Blog
By July 09, 2020 18 MIN READ

Authentic8 Silo Labeled High Performer on G2

G2 released its Summer 2020 reports, and — based on verified Authentic8 customer reviews — Silo is now considered a High Performer in the Threat Intelligence and Secure Web Gateways categories. G2…

blog-icon
Blog
By A8 Team June 25, 2020 3 MIN READ

OSINT tip: how to analyze Exif data

Intelligence analysts, law enforcement, legal investigators, and investigative journalists all analyze metadata stored with digital images to gather insights about people, events, and locations…

blog-icon
Blog
By Ramesh Rajagopal June 12, 2020 4 MIN READ

Identity Gateways ❤️ Web Isolation: The perfect marriage for Zero Trust access

In my previous post, I discussed the adoption of Zero Trust/SASE architectures to address the new risks associated with a decentralized world where direct-to-cloud access renders perimeter gateways…

Close
Close