Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Video
    Video

    Introduction to Tor and its value to sensitive research

    In this video, our OSINT trainer "peels back the onion" on the darknet, Tor. Learn what types of info can be found there, anonymity security risks, downsides of the DIY access approach and how to improve dark web research quality and efficiency

    Watch Now
    five people sitting around a table and studying
    podcast-icon
    Podcast

    S2E37 | OSINT’s journey from academia…
    S2E37 | OSINT’s journey from academia to decision-makers

    Listen
    Video
    Video

    Take a self-guided tour of Silo for Research

    Learn how Authentic8's unique approach meets the needs of online investigations for financial fraud, AML, threat intelligence, OSINT and other fields

    Watch Now
    cyber graphic of fingerprint on lock
    podcast-icon
    Podcast

    S2E36 | Is your digital fingerprint…
    S2E36 | Is your digital fingerprint following you into 2023?

    Listen
    image: law enforcement officer looks at documents, a bullet through a lock and wavelengths
    podcast-icon
    Podcast

    S2E35 | The best of season 1
    S2E35 | The best of season 1

    Listen
    Success Story
    Success Story

    Global sports equipment manufacturer defends its reputation for quality and excellence against counterfeiters

    A global manufacturer uses Silo for Research to combat counterfeit and stolen goods’ sellers and protect the company’s brand and reputation for excellence.

    Read more
    Chair next to a bookshelf
    podcast-icon
    Podcast

    S1E34 | Book club: This Is How They…
    S1E34 | Book club: This Is How They Tell Me the World Ends

    Listen
    Person reading a book with a mug in hand
    podcast-icon
    Podcast

    S1E33 | Book club: We Are Bellingcat
    S1E33 | Book club: We Are Bellingcat

    Listen
    Man teaching code
    podcast-icon
    Podcast

    S1E32 | Practical OSINT tips from the…
    S1E32 | Practical OSINT tips from the field

    Listen
    Close
    Close