Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Flash Report
    Flash Report

    Crypto money laundering on the rise

    Money laundering with cryptocurrency creates new challenges for AML investigators. Blockchain technology can help track transactions

    Read more
    Video
    Video

    OSINT live training by Authentic8 28 APR: dark web research

    The dark web has become a hotspot for criminal activity. Learn how to combine the dark web intelligence and OSINT to identify persons of interest.

    Watch Now
    Video
    Video

    OSINT live training by Authentic8: SHODAN

    A detailed look into Shodan – a search engine for the IoT – and how it can be used for OSINT

    Watch Now
    Video
    Video

    The next evolution of cyber threat intelligence: structure, training and regulations

    SANS expert Jake Williams and Authentic8’s Nick Espinoza discuss the future of investigation platforms, data collectors, and regulations on data handling

    Watch Now
    Guide
    Guide

    Rapidly enabling remote workers in time of crisis

    Practical advice for CIOs and CISOs on how to quickly and securely enable remote workers in time of crisis

    Read more
    Video
    Video

    Why cyber threat intelligence researchers need access to the dark web

    SANS expert Jake Williams and Authentic8’s Nick Espinoza talk about where CTI researchers can find high-value data while staying secure and anonymous

    Watch Now
    Video
    Video

    How to use OSINT for cyber threat intelligence investigations

    SANS expert Jake Williams and Authentic8’s Nick Espinoza discuss the current landscape around cyber threat intelligence and open-source intelligence (OSINT)

    Watch Now
    Solution Brief
    Solution Brief

    Law enforcement in the digital age

    Collect social media and dark web evidence anonymously and in compliance

    Read more
    Video
    Video

    Challenges in the browser & securing web sessions

    Authentic8 CEO Scott Petry speaks to Business Security Weekly on how he's used the cloud to disrupt the infosec market for nearly 20 years

    Watch Now
    Close
    Close