Just another WordPress site
  • Parent page
  • Platform
  • Partners
    • Partnering with Us
    • Our Partners
    • Partner Portal
  • Company
    • About
    • Trust Center
    • Support
    • Careers
  • Resources
    • Library
    • Free Tools
    • Blog
    • Training
  • Contact
Platform The Horizon® Platform

Enterprise investigation platform specialising in open-source intelligence.

Components
read more
Identity Rapid Triage
read more
Investigate Link Analysis
read more
Monitor Ongoing Analysis
Use Case
  • Law Enforcement
  • Government
  • Corporate Security
  • Fraud and Risk
  • Insurance
  • Cybersecurity and Threat Intelligence
  • Integrations
  • SocialNet® API
  • Platform
  • Partners
  • Company
  • Resources
  • Contact
Platform The Horizon® Platform

Enterprise investigation platform specialising in open-source intelligence.

Components
read more
Identity Rapid Triage
read more
Investigate Link Analysis
read more
Monitor Ongoing Analysis
Use Case
  • Law Enforcement
  • Government
  • Corporate Security
  • Fraud and Risk
  • Insurance
  • Cybersecurity and Threat Intelligence
  • Integrations
  • SocialNet® API
  • Partnering with Us
  • Our Partners
  • Partner Portal
  • About
  • Trust Center
  • Support
  • Careers
  • Library
  • Free Tools
  • Blog
  • Training

Resources

Blog
Free OSINT Tools
Guides
Topics
Filter
Blog
Free OSINT Tools
Guides
Topics
Dark Web
Know Your Customer
Cybersecurity
Monitor
Financial Institutions
Criminal Investigations
Technical Tips and Training
News and Commentary
Solutions
Artificial Intelligence
Corporate Security
Fraud and Risk
Government
Insurance
Law Enforcement
OSINT
Security and Compliance
Investigator reviewing digital identity profile and forensic evidence on computer screen for a child exploitation investigation

Case Study: Accelerating Identification in Child Exploitation Investigations

Blog
13 Mar 2026
View Case Study: Accelerating Identification in Child Exploitation Investigations
Business professional analyzing open data, identity networks, and secure OSINT intelligence insights with visual link analysis and real-time monitoring dashboard

ShadowDragon vs. Penlink Tangles: A detailed OSINT comparison

Blog
25 Feb 2026
View ShadowDragon vs. Penlink Tangles: A detailed OSINT comparison
Digital eKYC verification interface showing biometric ID checks, encryption, sanctions screening, and global compliance security icons

How to use generative AI in KYC

Blog
25 Feb 2026
View How to use generative AI in KYC
Business analyst reviewing data dashboards on a laptop with transparent analytics interface, symbolizing ethical OSINT research and lawful data analysis

OSINT vs. surveillance: Why ethical boundaries matter in open source intelligence

Blog
24 Feb 2026
View OSINT vs. surveillance: Why ethical boundaries matter in open source intelligence

OSINT year in review: How open-source intelligence became core to enterprise risk in 2025

Blog
23 Dec 2025
View OSINT year in review: How open-source intelligence became core to enterprise risk in 2025

Professional OSINT is not about data. It’s about decisions.

Blog
15 Dec 2025
View Professional OSINT is not about data. It’s about decisions.
KYC best practices to reduce risk

7 KYC best practices to reduce risks

Blog
12 Dec 2025
View 7 KYC best practices to reduce risks
KYC challenges

8 biggest KYC challenges (and how to overcome them)

Blog
12 Dec 2025
View 8 biggest KYC challenges (and how to overcome them)

Corporate KYC: Verify and onboard businesses effectively

Blog
12 Dec 2025
View Corporate KYC: Verify and onboard businesses effectively

KYC vs. KYB: What’s the difference?

Blog
12 Dec 2025
View KYC vs. KYB: What’s the difference?

8 ways KYC prevents fraud

Blog
11 Dec 2025
View 8 ways KYC prevents fraud

KYC Fintech: Crafting a risk-based verification strategy

Blog
11 Dec 2025
View KYC Fintech: Crafting a risk-based verification strategy

KYC risk assessment: Why it matters for ongoing monitoring

Blog
10 Dec 2025
View KYC risk assessment: Why it matters for ongoing monitoring

Perpetual KYC: Benefits, risks, and compliance advantages

Blog
10 Dec 2025
View Perpetual KYC: Benefits, risks, and compliance advantages

Top 5 fraud detection techniques every organization should know

Blog
24 Nov 2025
View Top 5 fraud detection techniques every organization should know

AML and KYC: Compliance guide for banks and financial institutions

Blog
17 Nov 2025
View AML and KYC: Compliance guide for banks and financial institutions

What is Know Your Customer (KYC), and why is it important in banking?

Blog
17 Nov 2025
View What is Know Your Customer (KYC), and why is it important in banking?

What is KYC remediation? Step by step guide

Blog
11 Nov 2025
View What is KYC remediation? Step by step guide

KYC vs. CDD: What’s the difference?

Blog
10 Nov 2025
View KYC vs. CDD: What’s the difference?

Required KYC documents for banks

Blog
10 Nov 2025
View Required KYC documents for banks

Automated KYC verification: 8 winning strategies

Blog
10 Nov 2025
View Automated KYC verification: 8 winning strategies

How OSINT is transforming stadium security: Real-time insight for game day threats

Blog
07 Nov 2025
View How OSINT is transforming stadium security: Real-time insight for game day threats

KYC verification process: 8 steps to compliance

Blog
24 Oct 2025
View KYC verification process: 8 steps to compliance

What is KYC in crypto? Requirements, process, and verification explained

Blog
15 Oct 2025
View What is KYC in crypto? Requirements, process, and verification explained

OSINT without barriers: Spend time on the case, Not the bureaucracy (with OSINT tools)

Blog
08 Oct 2025
View OSINT without barriers: Spend time on the case, Not the bureaucracy (with OSINT tools)

Top 5 fraud detection techniques every organization should know in 2026

Blog
05 Sep 2025
View Top 5 fraud detection techniques every organization should know in 2026

What is identity intelligence? Techniques, benefits, and real-world applications in 2026

Blog
28 Aug 2025
View What is identity intelligence? Techniques, benefits, and real-world applications in 2026

Corporate security compliance: How to meet regulations to stay compliant

Blog
14 Aug 2025
View Corporate security compliance: How to meet regulations to stay compliant

9 biggest corporate security trends shaping modern risk management

Blog
06 Aug 2025
View 9 biggest corporate security trends shaping modern risk management

Corporate security in banking: 12 best practices

Blog
24 Jul 2025
View Corporate security in banking: 12 best practices
1 2 3
Ready to start the conversation?
Talk to an OSINT expert.
Speak with our team
Resources Blog
  • Platform
  • Partners
  • Company
  • Resources
  • Login
  • Contact
  • Partner Portal
  • Trust Center
  • © 2026 ShadowDragon. All rights reserved.
  • Privacy Policy
  • Cookie Settings