Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Video
    Video

    The Intel Drop | Counterfeit software: investigating fraudulent programs with Silo

    AJ walks us through a project where he examines the availability of counterfeit software on the dark web. He highlights the use of remote administration tools like Venom Rat and shows how Silo streamlines the process of safe and efficient online research.

    Watch Now
    Video
    Video

    The Intel Drop | Typosquat monitoring: fraudulent website detecting with Silo

    AJ demonstrates how he uses Silo from Authentic8 to monitor suspicious domains like 'amason.com' to prevent potential fraudulent activities. Learn how to detect and monitor typosquatting and protect your brand from online threats.

    Watch Now
    Video
    Video

    The Intel Drop | A noble profession

    Watch Now
    Black-bg-image
    podcast-icon
    Podcast

    E85 | An OSINT investigator’s toolkit
    E85 | An OSINT investigator’s toolkit

    Listen
    Video
    Video

    The Intel Drop | Where geopolitics meet cyber

    Using the recent U.S. bombing in Iran as a case study, AJ guides explains the process of assessing risks, identifying threat actors and preparing for potential cyber attacks.

    Watch Now
    cyber graphic of outline of human face
    podcast-icon
    Podcast

    E84 | AI as an insider threat
    E84 | AI as an insider threat

    Listen
    Video
    Video

    The Intel Drop | Malware handling: staying safe with Silo

    Join AJ Nash, Digital Intelligence Advocate for Authentic8, as he dives into the importance of safe practices when investigating malware.

    Watch Now
    ball in maze
    podcast-icon
    Podcast

    E83 | Adventures in OSINT Red Teaming
    E83 | Adventures in OSINT Red Teaming

    Listen
    Video
    Video

    The Intel Drop | Think bigger: ruminations on a growing industry

    Join AJ Nash, Digital Intelligence Advocate for Authentic8, as he dives into the importance of elevating intelligence within private sector organizations.

    Watch Now
    Close
    Close