Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

generia blog

Modern CTO interview: Flipping turtles

Things move fast at Authentic8, most of the time. And if they don’t? That’s when leaders shine as enablers and get things back on track.…

generia blog

Handbook: Tools, tips and tricks for threat hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.

larry-loeb-head

SPAs: attack surface-are-us

Web designers love single-page apps (SPAs) because they load quickly and conceal connection deficiencies. They are also the cause of data…

generia blog

Do financial crime investigators have a bull’s eye on their backs?

The COVID-19 pandemic seems like a double whammy for financial crime investigators. While online fraud has skyrocketed, teams are still…

generia blog

"Almost like a virtual safe room"

Are you following Smashing Security, the award-winning podcast with "a helpful and hilarious take on the week's tech SNAFUs" (tag line)?…

generia blog

CMMC: Still on track?

A landmark effort by the Department of Defense to shore up cybersecurity across its 300,000+ contractor base has managed to stay mostly on…

generia blog

Is my data for sale on the dark web?

The pandemic is accelerating the move to location-distributed work. Want to know how the rush into remote work has weakened the…

generia blog

Authentic8 Silo labeled High Performer on G2

G2 released its Summer 2020 reports, and — based on verified Authentic8 customer reviews — Silo is now considered a High Performer in the…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close