Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Video
    Video

    The Intel Drop | Searching the dark web: a threat investigation

    AJ investigates potential threats by tracking down suspicious activity related to 'Task Force 43' on the dark web. Watch how he navigates through dark web resources to uncover concerning details about a possible hitman service, demonstrating the ease and speed of using Silo for high-stakes cyber investigations.

    Watch Now
    illustration of a diverse group people
    podcast-icon
    Podcast

    E82 | How culture can inform OSINT…
    E82 | How culture can inform OSINT investigations

    Listen
    Ransomware Gangs and OSINT
    podcast-icon
    Podcast

    E81 | Ransomware Gangs and OSINT
    E81 | Ransomware Gangs and OSINT

    Listen
    cyber lock graphic
    podcast-icon
    Podcast

    E79 | Entering infosec as an outsider!…
    E79 | Entering infosec as an outsider! Tips from a librarian turned cyber analyst

    Listen
    counterintelligence
    podcast-icon
    Podcast

    E78 | What is counterintelligence?
    E78 | What is counterintelligence?

    Listen
    Solution Brief
    Solution Brief

    Enhancing Manufacturing Security and Investigations with Silo

    The manufacturing industry faces an evolving landscape of cyber threats, fraud, and supply chain vulnerabilities that can disrupt operations, damage brand reputation, and result in financial losses.

    Read more
    Solution Brief
    Solution Brief

    Enhancing Financial Services Investigations with Silo

    Financial institutions are at the forefront of the battle against financial crimes such as money laundering and fraud. They are also the targets of insider attacks and phishing. SOC, CTI, and financial fraud investigation teams must navigate a complex and ever-evolving threat landscape.

    Read more
    podcast microphone
    podcast-icon
    Podcast

    E77 | "We’re back, and we’re your…
    E77 | "We’re back, and we’re your new hosts."

    Listen
    pitbull behind fence
    podcast-icon
    Podcast

    S3E76 | Using OSINT to investigate…
    S3E76 | Using OSINT to investigate organized animal crime

    Listen
    Close
    Close