Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails…

generia blog

Use OSINT to contextualize GEOINT

The ZAPAD-21 military exercise is a prime example of an event where GEOINT can benefit from the added context of OSINT.

What’s in your digital fingerprint and how to control it

What’s in your digital fingerprint and how to control it

Your digital fingerprint — or browser fingerprint — may seem like innocuous details. But for online investigators, especially in law…

4 things you shouldn’t do on the dark web

4 things you shouldn’t do on the dark web

Avoid a world of trouble by following these four simple recommendations of what not to do on the dark web during online investigations.

Best practices for creating a dark web access policy

Best practices for creating a dark web access policy

Protect your company and employees by creating a dark web access policy to set protocol for investigations to mitigate security and…

Mitigating risk in SOC investigations with managed attribution

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

7 tools for improving surface and dark web research

Essential tools for improving surface and dark web research

Leveraging these easy-to-use tools for surface as well as dark web investigations can help improve the quality and speed of your research.

generia blog

Risk mitigation with web isolation

Users surfing the web on traditional browsers has been the thorn in the side of cybersecurity teams since the dawn of malware. Web…

generia blog

Online investigation best practices: 3 strategies to follow

There are a lot of resources out there to help researchers. Here are Authentic8’s 3 online investigation best practices to stay productive…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close