Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.
In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.
Learn when and how to automate OSINT data collection. Real-life examples of how automation can reduce speed time-to-resolution.
Managed attribution is essential to keeping online investigations secure and anonymous
Trust and safety teams investigate potentially harmful situations, monitor user activity and set up policies to build an environment of trust