Surprising Ways OSINT is Used for Good
Open source intelligence (OSINT) is a powerful tool used for good across various sectors, including combating human trafficking, preventing crime, monitoring elections, ensuring corporate responsibility, protecting consumers, supporting humanitarian aid, and aiding public health and environmental efforts.
Building Trust in a Security Landscape
Trust drives successful relationships in business and beyond. ShadowDragon builds trust through reliability, transparency, and security. From SOC2 compliance to the US-EU Data Privacy Framework, we ensure robust data protection and ethical practices, fostering strong, lasting partnerships.
OSINT Due Diligence: Enhancing Business Resilience in a Geopolitical Landscape
The need for deeper insights through due diligence is a must as modern businesses evolve with the changing landscape of compliance needs. Invisible lines are being drawn through sovereign borders […]
ShadowDragon Commentary: Rethinking Open-Source Intelligence for Security in Commercial Settings
Recently, ShadowDragon COO, Jonathan Couch, contributed an article to InfoSecurity Magazine on thepotential for open-source intelligence (OSINT) to bolster security efforts within the private sector. In thispiece, Couch reflects on […]
Data vs. Intelligence
It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you […]
Background Checks & Due Diligence
Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]
Heat Maps: Form Over Function
Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: […]
The Problem with Technology Keywords
Big data, AI, machine learning, block chain, and every other cool new tech words are all really just that–words. To a developer or computer scientist, they are a type of […]
Into the Breach
We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In […]