Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

man typing on computer

5 key reasons why VPN alone won't protect you or your research

What you need to know about VPNs and the security implications that come with relying on it alone.

OSINT news roundup

OSINT news roundup: Pelosi’s Taiwan visit, Russian radio codes and search tips

Stay up to date with the latest OSINT news from around the world.

OSINT in the FY23

OSINT in the FY23 Defense and Intelligence Authorization Bills

We break down the intelligence authorization bills currently moving through the U.S. House and Senate. If passed, they could help bolster…

China's role in Fentanyl production

OSINT news roundup: China’s Fentanyl role, private military groups and “Shields Up”

This week’s OSINT news includes a review of the Cybersecurity and Infrastructure Agency’s (CISA) “Shields Up” campaign, focused on…

An eroding digital face

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

Defining OSINT

What we talk about when we talk about OSINT

What is OSINT? Defining a term for a living, evolving practice can be a challenge, subject to who you ask, what you’re referring to and a…

Person using smartphone

Beyond Twitter: 6 social media sites you should be using for OSINT research

Social media is rife with open-source information that can prove vital to OSINT, but are you using all the platforms at your disposal?

Private security guard

OSINT news roundup: China eyes on Ukraine, an end to nuclear secrecy, private security’s misinformation

While the world’s eyes are on Ukraine, one nation is paying special attention: China. The global super power with territorial axes to grind…

People standing around a computer

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close