Blog

Threat intelligence platform concept showing digital alerts for cloud security, identity correlation, phishing, and external attack surface monitoring

21 Best Threat Intelligence Platforms (2025 Guide)

By Nico Dekens | September 5, 2025

Threat intelligence has become a critical function for security operations. With the rapid shift in attack tactics and a proliferation of threat signals on the surface, deep, and dark web, security teams need tools that help them filter out the noise, surface the real risks, and respond in an informed and targeted way. Threat Intelligence […]

Cybersecurity concept showing a person using a laptop and tablet with a digital wireframe face, warning icons, and deepfake alerts symbolizing AI-driven fraud detection tools

21 Best Fraud Detection Software Tools (2025 Guide)

By Nico Dekens / September 5, 2025

Fraud tactics are evolving faster than ever, and they’re becoming increasingly sophisticated. Driven by AI, automation, and novel attack vectors like synthetic identities and phishing-based account takeovers, organizations today face […]

Digital interface showing a man’s face with facial recognition mapping lines, highlighting AI-based identity verification and fraud detection

Top 5 Fraud Detection Techniques Every Organization Should Know

By Nico Dekens / September 5, 2025

Fraud is an arms race. Account takeovers, synthetic identities, and organized fraud rings are just a few of the ways attackers are testing organizations’ defenses and looking for weak spots. […]

Person holding a smartphone with a digital lock and facial recognition overlay, representing identity verification and biometric authentication in identity intelligence.

What is Identity Intelligence? Techniques, Benefits, and Real-World Applications

By Nico Dekens / August 28, 2025

Understanding who’s behind digital activity can shift the direction of an investigation. That’s the essence of identity intelligence: the process of collecting, enriching, and analyzing identifiers such as usernames, email […]

Business professional interacting with virtual security and compliance icons, including a lock, legal symbol, and cloud storage graphic

Corporate Security Compliance: How to Meet Regulations to Stay Compliant

By Nico Dekens / August 14, 2025

Corporate security compliance is a critical part of operating in today’s regulatory environment. Whether you’re handling healthcare records, financial data, or cloud infrastructure for government clients, regulators expect proof that […]

Concept image of corporate security risk assessment with a lock shield at the center and multiple digital threat icons surrounding it

10 Steps to Conduct a Corporate Security Risk Assessment

By Nico Dekens / August 13, 2025

Every organization faces corporate security risks, but not every organization knows where those risks are or how to prioritize them. A well-executed corporate security risk assessment gives you the visibility […]

Red digital warning symbol over a glowing network map, representing cybersecurity threats and the importance of threat intelligence tools in identifying and mitigating risks

12 Best Threat Intelligence Tools (2025 Guide)

By Nico Dekens / August 6, 2025

As cyber threats grow more sophisticated, security teams need tools that deliver speed, clarity, and actionable context. The right threat intelligence tools can expose malicious infrastructure, detect suspicious activity, reduce […]

Conceptual image of a person holding a smartphone with digital warning symbols, representing corporate security trends in mobile threat detection and real-time alerting

9 Biggest Corporate Security Trends Shaping Modern Risk Management

By Nico Dekens / August 6, 2025

Remote work, cloud sprawl, and supply chain dependencies have permanently reshaped the risk landscape, shifting where threats emerge and how they remain concealed. Meanwhile, threats are faster, more distributed, and […]

Hand holding a smartphone with holographic icons of a bank, currency, and digital finance elements, symbolizing mobile banking security

Corporate Security in Banking: 12 Best Practices

By Nico Dekens / July 24, 2025

Banks are high-value targets for cybercriminals, fraudsters, and nation-state actors seeking financial gain, sensitive data, or systemic disruption. Between the money, data, and public visibility, it’s no surprise they attract […]

Key requirements for effective corporate mobile security

14 Essential Corporate Mobile Security Requirements

By Nico Dekens / July 24, 2025

Mobile security is no longer limited to traditional endpoints like desktops and laptops. Today’s workforce depends on smartphones, tablets, and laptops to access sensitive emails, corporate systems, and critical business […]

Corporate security monitoring

Corporate Security Monitoring: 9 Key Benefits

By Nico Dekens / July 16, 2025

Most security incidents rarely happen without warning and emerge from known vulnerabilities or missed threats. There’s usually a signal, such as a leaked password, a spoofed domain, or malware hiding […]

Security analyst with binoculars viewing network activity

12 Ways to Improve Corporate Security Awareness

By Nico Dekens / June 30, 2025

Employees are your first line of defense. No matter how sophisticated your security operations are, a single click, one misplaced device, or one overlooked warning sign can unravel your best-laid […]

Attention warning attacker alert sign with exclamation mark on dark background with abstract network connections illustration

Information Security Policy: 14 Key Elements for Corporate Security

By Nico Dekens / June 27, 2025

Information security policies (ISPs) are guardrails for your business. They define who can access what, how data is handled, and what happens when something goes wrong. Without an ISP, you’re […]

Analyst reviewing data for a corporate security investigation

20 Best Practices for Effective Corporate Security Investigations

By Nico Dekens / June 27, 2025

The stakes are high in corporate security investigations. A single misstep can erase evidence, trigger legal exposure, or leave threats unresolved. Whether you’re investigating insider leaks, external breaches, or executive […]

World map in red

8 Best Social Media Monitoring Tools for Law Enforcement (2025)

By Nico Dekens / June 18, 2025

Law enforcement agencies depend on sophisticated tools for detecting threats and tracking suspects, and social media monitoring has become an indispensable source of intelligence. Social media can support investigators’ efforts […]

Social media monitoring for government

Social Media Monitoring for Government: Expert Guide

By Nico Dekens / June 13, 2025

In the current threat environment, ignoring social media is a liability governments can’t afford. Social platforms function as more than communication tools, serving as digital battlegrounds where narratives form, movements […]

Monitoring social media for threats

Social Media Threat Monitoring: 10 Effective Strategies in 2025

By Nico Dekens / June 13, 2025

Social media threat monitoring is a key component of open-source intelligence (OSINT) that involves real-time tracking and analysis of social media platforms to detect security threats, harmful content, and criminal […]

Corporate data security best practices

Corporate Data Security: 10 Best Practices for Protecting Sensitive Business Information

By Nico Dekens / June 10, 2025

Threat actors don’t need to break down your front door; they just wait for an unpatched server, a shared password, or a misconfigured S3 bucket to seize an opportunity for […]

Strengthening your corporate security plan

8 Strategies to Strengthen Your Corporate Security Plan

By Nico Dekens / June 10, 2025

Modern threats operate continuously and ignore organizational boundaries between departments. Attackers target every possible vulnerability through phishing attacks, malware, insider threats, and even physical breaches. That’s why an effective corporate […]

Corporate security

What is Corporate Security? The Complete Guide

By Nico Dekens / June 4, 2025

Corporate security isn’t just about surveillance cameras, firewalls, or background checks. It’s about protecting the entire operation, from people and data to operations and reputation. Today’s threats don’t come from […]

shadowdragon share

ShadowDragon Introduces Horizon™ Identity – Eliminate Complexity

By Amy Mortlock / June 2, 2025

ShadowDragon is proud to introduce Horizon™ Identity, the newest feature in our Horizon™ platform. Horizon™ Identity was designed from the ground up to empower users of all technical skill levels […]

OSINT checklist and advanced tasks for cybersecurity pros

OSINT Checklist: Advanced Task List for Cybersecurity Pros

By Nico Dekens / May 28, 2025

Open Source Intelligence (OSINT) extends beyond passive data collection, following a structured approach to uncover hidden connections and expose vulnerabilities. Cybersecurity experts can utilize OSINT techniques to gain crucial information […]

OSINT Exercises: Ultimate Guide to Enhancing Your Investigative Skills

OSINT Exercises: Ultimate Guide to Enhancing Your Investigative Skills

By Nico Dekens / May 28, 2025

Open-source intelligence (OSINT) isn’t just about knowing where to look but also about knowing how to think critically. The internet holds a staggering volume of information, and much of it […]

Futuristic digital grid with glowing nodes and red laser-like connections, representing a high-tech network or quantum computing system

What is the OSINT Framework?

By Nico Dekens / April 25, 2025

In an increasingly data-rich world, open-source intelligence (OSINT) has become a crucial part of investigative work for investigators, analysts, cybersecurity professionals, journalists, law enforcement, and researchers. Whether you’re tracking down […]

Globe and data connections, OSINT concept

OSINT Techniques: Complete List of Expert Tactics for Investigators

By Nico Dekens / April 10, 2025

Today, vast amounts of publicly accessible information—which is used to produce open-source intelligence (OSINT)—can be leveraged to uncover truths, verify identities, track events, and assess threats. But tapping into this […]

23 Best OSINT Tools for Advanced Intelligence Gathering in 2025 (Paid and Free Options)

By Nico Dekens / April 10, 2025

Open Source Intelligence (OSINT) has become an essential practice for investigators, analysts and cybersecurity professionals. Whether you’re tracking threat actors, uncovering digital footprints, or monitoring public sentiment, having the right […]

shadowdragon share

Just Do… OSINT: A Short Primer On Identifying Counterfeits Online

By Nico Dekens / April 4, 2025

OSINT analysts at large brands like Nike and Adidas regularly face the challenge of uncovering counterfeit sellers in a rapidly evolving digital environment. Successful brand protection depends on strategic thinking, […]

ShadowDragon introduces Horizon™ Identity

The Slow Collapse of Critical Thinking in OSINT due to AI

By Nico Dekens / April 3, 2025

OSINT used to be a thinking game. Now it’s becoming a trusting game and that should terrify you. I’ve seen it firsthand, analysts running solid investigations, then slowly shifting more […]

shadowdragon share

Unmasking the Fentanyl Trade in Illicit Online Marketplaces

By Amy Mortlock / March 3, 2025

Illicit fentanyl continues to ravage communities across North America, with new details emerging on how Chinese money brokers help Mexican drug cartels launder massive profits. Below, we weave together these sources and insights from CACI’s DarkBlue Intelligence Suite and ShadowDragon, illustrating how supply chain, financial flows, and investigative technology converge.

Open Source Intelligence (OSINT): What It Is, How It Works, and Why It Matters (+ Tools, Techniques & Use Cases)

By Nico Dekens / February 12, 2025

Discover the power of Open Source Intelligence (OSINT), an essential tool that transforms publicly available data into actionable insights. Learn about its history, methodologies like web scraping and social media monitoring, and the ethical considerations that guide its responsible use.

shadowdragon share

Spotting the Signs: How Social Media and the Dark Web can Reveal Human Trafficking Activity

By Amy Mortlock / January 13, 2025

By: Amanda Blake and David Cook From 2012 to 2022, human trafficking convictions doubled, according to the US Bureau of Justice Statistics. While this most likely indicates an increase in […]

Navigating Election Monitoring: Insights on Security, Disinformation, and Social Media Trends

By Amy Mortlock / October 17, 2024

ShadowDragon’s latest podcast explores election monitoring challenges, including misinformation, security threats, and social media’s role in shaping narratives, with insights from expert analyst Bryeanne Ravettine.

partners resellerfeature@2x

Smart Security: Fighting Financial Fraud with Open Source Intelligence

By Sandy M / October 16, 2024

Financial fraud is rising, with consumers losing over $10 billion in 2023. OSINT solutions help organizations detect threats, analyze patterns, and identify attackers, offering a proactive defense against emerging fraud trends.

CaseStudy uncover and attribute@2x

How Does OSINT Make It Hard for Cybercriminals to Work?

By Nico Dekens / October 9, 2024

OSINT leverages publicly available data from the surface, deep, and dark web to detect cyber threats, uncover cybercriminal activities, and enhance proactive defense. It aids in threat intelligence, exposing identities, and supporting law enforcement to disrupt malicious operations.

features customize@2x

Surprising Ways OSINT is Used for Good

By Amy Mortlock / September 25, 2024

Open source intelligence (OSINT) is a powerful tool used for good across various sectors, including combating human trafficking, preventing crime, monitoring elections, ensuring corporate responsibility, protecting consumers, supporting humanitarian aid, and aiding public health and environmental efforts.

How Failing Faster Helps Catch Criminals: Exploring OSINT for Law Enforcement

By Sandy M / September 18, 2024

In law enforcement, the ability to adapt quickly and learn from mistakes is crucial. This concept, often called “failing faster,” is not about accepting failure but about using it as […]

Thumb UseCases@2x

Unpacking OSINT: The Power of Publicly Available Information

By Amy Mortlock / September 11, 2024

Discover the power of Open Source Intelligence (OSINT) for turning publicly available data into actionable insights. From national security to corporate risk management, learn how OSINT tools identify patterns, track threats, and uncover new opportunities while addressing ethical considerations.

dark prism data wave

The 13 Biggest OSINT Investigation Challenges

By Nico Dekens / September 4, 2024

Conducting OSINT investigations can be challenging, with issues like information overload, data quality verification, technical skills, legal considerations, and misinformation. Overcoming these hurdles requires the right tools, methodologies, and expertise to streamline efforts and ensure actionable insights.

Illuminating Context with Timeline Analysis

By Amy Mortlock / July 29, 2024

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]

Introducing ShadowDragon’s Horizon™ Monitor.

By Amy Mortlock / July 15, 2024

We are excited to announce a game-changing enhancement to our Horizon™™™™ intelligence platform: Horizon™™™™ Monitor. This represents a significant leap forward, seamlessly integrating with our existing world-class OSINT link analysis, […]

ShadowDragon Partners with SynapseAi to Expand Influence in Asia Pacific

By Amy Mortlock / June 26, 2024

Hoover, AL – [26th June] – ShadowDragon™, a provider of ethical open-source intelligence (OSINT), unique datasets and APIs, is pleased to expand its partner ecosystem through a strategic partnership with […]

Scroll to Top