Hi [[ session.user.profile.firstName ]]

Cloud-based Research Platform for Threat Hunters

Learn how to apply threat intelligence and use dark web visibility to reduce risk within your organisation.

Threat intelligence is no longer a luxury. It has become the foundation upon which a strong security posture is constructed. But where do you start?

Join Authentic8 and Recorded future to see threat hunters run Recorded Future on the Silo Research Toolbox platform to access deep and dark websites safely and securely with managed attribution.

You will:

-Get best practices and case studies for implementing threat intelligence as part of your own information security strategy

-Understand the distinction between data and intelligence

-Gain insight into the value of different intelligence gathered from sources spread across the open and dark web

-Find out how a cloud-based browser can eliminate risk and lowers costs for threat hunters
Recorded May 8 2019 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Authentic8 and Recorded Future
Presentation preview: Cloud-based Research Platform for Threat Hunters

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Conducting Social Media Investigations Without Exposing Yourself Recorded: Jul 16 2019 25 mins
    Nicholas Finnberg and Claudia Berth
    In today’s cyber world, social media has become an extremely powerful research tool for investigators. As of January 2019, there are over 3.5 billion active social media users across the world and growing at a rate of 200 million new accounts per year. Investigators need a safe method to access and capture that data.
  • Your Browser Betrays You Recorded: Apr 25 2019 45 mins
    Mark Sarbiewski and John Klassen
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • New Release of Silo: Overview and Demo Recorded: Mar 14 2019 37 mins
    Mark Sarbiewski and Alfredo Cardenas
    In this webinar, we’ll cover all the key enhancements in the new Silo release, including branding and personalization, and you’ll learn how your users and administrators can take full advantage of them. We will make sure to leave time at the end of the webinar to answer questions.
  • Who’s using a Cloud Browser today? YOU’D BE SURPRISED. Recorded: Jan 29 2019 10 mins
    John Klassen, Product Marketing, Authentic8
    Whether for threat intelligence, handling sensitive data, or providing safe and anonymous access to the public web, a Cloud Browser lets you outsource your risk and increase your control over the web.
  • Maintaining a Quality AML Program 2.0 Recorded: Aug 29 2018 35 mins
    Kevin Sullivan and Authentic8
    Kevin Sullivan spent 22 years in law enforcement before retiring from the NY State Police. He was the New York State money laundering coordinator at The NY HIFCA (High Intensity Financial Crimes Area) El Dorado Task Force at the NY HIDTA (High Intensity Drug Trafficking Area. This is the largest money laundering task force in the world.

    In this webinar, Kevin will discuss how organizations can maintain a quality AML program.
Learn how the Cloud Browser can keep your organization secure.
Founded in 2010 by principals from Postini, Authentic8 is redefining how the browser is used to access sensitive web data. Silo, our flagship product, is a cloud browser that creates an insulation layer between the computer and potentially dangerous content. Silo helps manage login credentials, access controls, and data use policies. Silo is built fresh at session start and destroyed at session end, ensuring that users remain secure, compliant, and anonymous online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud-based Research Platform for Threat Hunters
  • Live at: May 8 2019 12:00 pm
  • Presented by: Authentic8 and Recorded Future
  • From:
Your email has been sent.
or close