Welcome to the Authentic8 blog

Wednesday, August 17
Person working on multiple monitors and laptops

Non-negotiable security needs SOCs to combat rise in phishing

Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
surface vs dark
Surface web vs. dark web: not as black and white as it may seem
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
How law enforcement can use OSINT
3 roadblocks for using OSINT in law enforcement

Latest blogs

OSINT news roundup: Ukraine’s intelligence successes, China’s new sub and Indo-Pacific moves

OSINT news roundup: Ukraine’s intelligence successes, China’s new sub and Indo-Pacific moves

What's behind Ukraine's apparent intelligence superiority over Russia? What has OSINT revealed about China's aircraft carrier off the coast…

cyrptocurrency

Cryptocurrency: the lynchpin to your investigation

Criminals' faith in cryptocurrency’s anonymity is investigators’ gain. Through blockchain analysis of cryptocurrency transactions,…

Cybersecurity executive order: one-year anniversary

Cybersecurity executive order: one-year anniversary

The executive order, Improving the Nation’s Cybersecurity, seeks to improve the federal government’s cybersecurity across agencies. One…

Give CTI its own seat at the table

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

staged photos and intercepted comms

OSINT news roundup: staged photos, intercepted comms and threat products

Stay up-to-date with the latest OSINT news from around the world

How law enforcement can use OSINT

3 roadblocks for using OSINT in law enforcement

Open-source intelligence plays a large role in closing investigations, but it’s still underutilized in the field. Here’s why.  

OSINT news roundup: apps to report war crimes, disguised disinfo and Bucha

OSINT news roundup: apps to report war crimes, disguised disinfo and Bucha

Stay up to date with the latest OSINT news from around the world

How adversaries use researcher’s digital fingerprint against them

How adversaries use researcher’s digital fingerprint against them

Hidden dangers are lurking in your digital fingerprint. Here's how to manage it.

OSINT news roundup: oligarchs, propaganda and how tech shifts a war

OSINT news roundup: oligarchs, propaganda and how tech shifts a war

Stay up to date with the latest OSINT news from around the world

Blog updates

Stay updated with the latest posts from the blog
Close
Close