Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

5 Must-reads for CMMC insight

DoD just released the final version of its new contractor cybersecurity requirements, the Cybersecurity Maturity Model Certification (…

generia blog

Research: More worries with Wasm

In many web browsers, the WebAssembly programming language is taking over execution tasks that were once exclusively the domain of…

generia blog

2019 in review: Data breach statistics and trends

What were the most significant data breaches in 2019? Will ransomware still be a threat in 2020? (Spoiler alert: It’s forecast to be…

generia blog

JavaScript: how NPM maintainer accounts amplify risk

20 compromised JavaScript package “maintainer” accounts — that’s all it takes to bring down the global digital supply chain through…

generia blog

How to detect browser extensions

Working on new methods and tools to identify browser exploits, I recently came across a common question again in a forum: "Is it…

generia blog

How to REALLY browse anonymously

When anonymous web access becomes business-critical, the web's favorite home remedies won't help. Worse, they can harm you and our…

generia blog

To Tor or not to Tor?

generia blog

Operation “Shields Up”: web isolation in the U.S. military

How can government organizations, private enterprises, and academic institutions minimize the cybersecurity and privacy risks associated…

generia blog

Malvertising: What You Should Know

Large-scale malvertising campaigns have pushed more than a billion malicious ads through online ad networks onto "secure" web browsers. Ad-…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close