Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Video
    Video

    The Intel Drop | Setting up a Silo workspace

    AJ Nash demonstrates how to set up anonymous online research session to avoid tracking and simulate local access from other countries. He guides you through setting up an ISP to appear as if you're browsing from Serbia using a Mac and Safari. He also shows you how to access and interpret local content as part of your research. Learn how quick and easy it is to obfuscate your location for security and accurate research.

    Watch Now
    Video
    Video

    The Intel Drop | Bypassing geoblocking with Silo

    AJ demonstrates how to bypass geo restrictions using Silo, ensuring uninterrupted research regardless of your location.

    Watch Now
    Video
    Video

    The Intel Drop | Counterfeit software: investigating fraudulent programs with Silo

    AJ walks us through a project where he examines the availability of counterfeit software on the dark web. He highlights the use of remote administration tools like Venom Rat and shows how Silo streamlines the process of safe and efficient online research.

    Watch Now
    Video
    Video

    The Intel Drop | Typosquat monitoring: fraudulent website detecting with Silo

    AJ demonstrates how he uses Silo from Authentic8 to monitor suspicious domains like 'amason.com' to prevent potential fraudulent activities. Learn how to detect and monitor typosquatting and protect your brand from online threats.

    Watch Now
    Video
    Video

    The Intel Drop | A noble profession

    Watch Now
    Black-bg-image
    podcast-icon
    Podcast

    E85 | An OSINT investigator’s toolkit
    E85 | An OSINT investigator’s toolkit

    Listen
    Video
    Video

    The Intel Drop | Where geopolitics meet cyber

    Using the recent U.S. bombing in Iran as a case study, AJ guides explains the process of assessing risks, identifying threat actors and preparing for potential cyber attacks.

    Watch Now
    cyber graphic of outline of human face
    podcast-icon
    Podcast

    E84 | AI as an insider threat
    E84 | AI as an insider threat

    Listen
    Video
    Video

    The Intel Drop | Malware handling: staying safe with Silo

    Join AJ Nash, Digital Intelligence Advocate for Authentic8, as he dives into the importance of safe practices when investigating malware.

    Watch Now
    Close
    Close