Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Compliance

Latest blogs

Topic : Compliance
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

Unmasking website ownership using OSINT

Learn to uncover website owners in an investigation without tipping off your lead.

Why you should be on the dark web

Many people view the dark web as a place for illegal activities, but anyone in a cyber investigation or analysis role should be looking at…

generia blog

White House issues zero trust architecture transition strategy

Federal agencies must implement a zero trust architecture by fiscal year 2024  

generia blog

New White House action improves security of nation’s most sensitive systems

Presidential action expands the oversight role for the NSA regarding national security systems

Best practices for creating a dark web access policy

Protect your company and employees by creating a dark web access policy to set protocol for investigations to mitigate security and…

generia blog

Cybersecurity executive order aims to uplevel protections across agencies

The Executive Order on Improving the Nation’s Cybersecurity takes aim at improving information sharing, supply chain security and tackling…

generia blog

Silo by Authentic8 is first authorized FedRAMP web isolation platform

Authentic8 is proud to announce its cloud-based platform is the first authorized FedRAMP web isolation solution meeting strict security…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

IT, legal, compliance: We need to talk.

Different priorities and communication gaps between teams threaten compliance and cybersecurity posture of financial firms, according to…

Blog updates

Stay updated with the latest posts from the blog
Close
Close