Welcome to the Authentic8 blog

Wednesday, August 17
Person working on multiple monitors and laptops

Non-negotiable security needs SOCs to combat rise in phishing

Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
surface vs dark
Surface web vs. dark web: not as black and white as it may seem
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
How law enforcement can use OSINT
3 roadblocks for using OSINT in law enforcement

Latest blogs

Man using a laptop

5 key reasons why VPN alone won't protect you or your research

What you need to know about VPNs and the security implications that come with relying on it alone.

OSINT news roundup

OSINT news roundup: Pelosi’s Taiwan visit, Russian radio codes and search tips

Stay up to date with the latest OSINT news from around the world.

OSINT in the FY23

OSINT in the FY23 Defense and Intelligence Authorization Bills

We break down the intelligence authorization bills currently moving through the U.S. House and Senate. If passed, they could help bolster…

China's role in Fentanyl production

OSINT news roundup: China’s Fentanyl role, private military groups and “Shields Up”

This week’s OSINT news includes a review of the Cybersecurity and Infrastructure Agency’s (CISA) “Shields Up” campaign, focused on…

An eroding digital face

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

Defining OSINT

What we talk about when we talk about OSINT

What is OSINT? Defining a term for a living, evolving practice can be a challenge, subject to who you ask, what you’re referring to and a…

Person using smartphone

Beyond Twitter: 6 social media sites you should be using for OSINT research

Social media is rife with open-source information that can prove vital to OSINT, but are you using all the platforms at your disposal?

Private security guard

OSINT news roundup: China eyes on Ukraine, an end to nuclear secrecy, private security’s misinformation

While the world’s eyes are on Ukraine, one nation is paying special attention: China. The global super power with territorial axes to grind…

People standing around a computer

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

Blog updates

Stay updated with the latest posts from the blog
Close
Close