Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

Cloud Browser Economics 101

We could go on all day long about the high price enterprises are paying for using traditional “free” browsers in their day-to-day business…

generia blog

81% of CIOs and CISOs Defer Critical Updates or Patches

New research indicates that eight out of ten CIOs and CISOs refrain from adopting an important security update or patch, due to concerns…

generia blog

FiServ: Minimize Vendor Risk Online in One Quick Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment advisors, and wealth management firms who worry…

generia blog

VPN: A Big Misunderstanding?

Most VPN services fail to provide a level of data protection and anonymity that would pass professional-level muster. Part 3 of our VPN…

generia blog

How Watering Hole Attacks Target the Financial Sector and Governments

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance,…

generia blog

VPN for Secure and Private Web Access? Think Again.

Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? Many…

generia blog

VPN and privacy: what nobody told you

Did you know that ISPs can use VPN to spy on you? Third parties taking advantage of your VPN’s many flaws for nefarious purposes. We…

generia blog

Financial Services: Blindspot Browser

For regulated investment firms, the SEC’s Office of Compliance Inspections and Examinations (OCIE) has prioritized “cybersecurity with…

generia blog

Quick dissections: Collections 2-5

The Collection #1 loot archive of stolen credentials is only the tip of the archive. All 5 collections contain more than 1TB of raw…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close