Join AJ Nash as he dives into the importance of bookmarks for conducting digital intelligence research. Learn how to efficiently organize and utilize various online resources, from operational tools and threat intelligence databases to breach reports and more. Discover AJ’s go-to sites and share your favorite bookmarks for a collaborative approach to cybersecurity research.
Join AJ Nash, digital intelligence advocate for Authentic8, as he showcases the importance and methods of using Silo to investigate reported phishing websites safely. Learn why secure browsing is crucial in avoiding potential malware and keeping your information secure while interacting with suspicious sites. AJ provides practical examples and demonstrates how developer tools can be leveraged to analyze site structures without revealing your identity or location. Discover the ease of using Silo for secure and anonymous online investigations.
Drawing from his experience as a former Air Force linguist, AJ Nash highlights the importance of linguists in intelligence collection and how Silo enables quick, anonymous translation without leaving any traces. Perfect for researchers dealing with international content, criminal behavior, terrorism, or news monitoring.
As AI tools become increasingly popular, it's essential to understand their potential and shortcomings. AJ Nash walks you through live demonstrations with AI platforms like Claude, ChatGPT, Perplexity, and Google Gemini to illustrate why AI is not yet reliable for producing actionable intelligence. While these tools can assist in many ways, they can't replace the expertise and nuance that human intelligence professionals bring to the table.
AJ Nash discusses the often overlooked connection between cybersecurity and physical security. Many organizations treat these as separate disciplines, leading to dangerous blind spots. AJ shares real-world examples and argues for a holistic approach to security, where teams collaborate and share intelligence to protect both systems and facilities. Learn why integrated operations and unified strategic leadership are essential for effective threat management.