Blog

CaseStudy uncover and attribute@2x

How Does OSINT Make It Hard for Cybercriminals to Work?

By Nico Dekens | October 9, 2024

Information and data are among the most valuable assets for any business or industry. They are critical elements that can either strengthen or compromise the security of an organization’s assets, network, or applications. No industry is exempt from the risk of cyberattacks, ranging from healthcare to education, data-rich organizations are potential targets, with information being […]

The G7, More Russian Sanctions, and a Warning

By David Cook / June 18, 2024

Nations met in Italy at a tense G7 Summit while the US Treasury levied more sanctions against Russia and Russian entities. The private sector must be vigilant to secondary sanctions […]

Building Trust in a Security Landscape

By ShadowDragon / June 13, 2024

Trust underpins successful relationships, whether they are personal or professional, between businesses and customers, employers and employees, or organizations and their stakeholders. As digital transformation accelerates, the mechanisms to establish […]

OSINT Due Diligence: Enhancing Business Resilience in a Geopolitical Landscape

By David Cook / May 13, 2024

The need for deeper insights through due diligence is a must as modern businesses evolve with the changing landscape of compliance needs. Invisible lines are being drawn through sovereign borders […]

Words Matter: Open-Source Intelligence for the Private Sector

By David Cook / April 30, 2024

The military and intelligence community are run by strict sets of doctrine, authorities, regulations, instructions, directives… the list goes on – this is not the same for the private sector. […]

Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

By ShadowDragon / April 14, 2024

In a landscape where information is power, the ability to gather, analyze, and act upon open-source intelligence (OSINT) is paramount for organizations across all sectors. Recognizing this need, we have […]

Bear Hunting: Mitigating Russian Sanctions Risk with OSINT

By David Cook / April 3, 2024

Since Russia’s invasion of Ukraine in February 2022, the multilateral Russian Elites, Proxies, and Oligarchs (REPO) Task Force has immobilized approximately $300 billion worth of Central Bank assets. Russia will […]

ShadowDragon Wins 2024 Frost & Sullivan Best Practices Award for Excellence in Global Open-Source Intelligence

By ShadowDragon / March 26, 2024

As a pioneer of open-source intelligence (OSINT) investigation tools dating back to 2009, ShadowDragon is honored by a recent award recognizing us as a transparent and reliable vendor that supports […]

ShadowDragon Enters Strategic Partnership with Collaboraite and Vestigo to Build Trust in OSINT

By ShadowDragon / March 26, 2024

Global leaders in open-source intelligence and operational security partner to foster trust in data and technology HOOVER, ALABAMA – March 4, 2024 – ShadowDragon™, a provider of ethical open-source intelligence […]

The (Un)hidden Threat: Child Grooming on Social Media

By ShadowDragon / March 25, 2024

Technative generations do not know life without the internet and even my one year old niece knows how to navigate a device. Whilst screen time can be good for learning […]

ShadowDragon Commentary: Rethinking Open-Source Intelligence for Security in Commercial Settings

By Jonathan Couch / March 25, 2024

Recently, ShadowDragon COO, Jonathan Couch, contributed an article to InfoSecurity Magazine on thepotential for open-source intelligence (OSINT) to bolster security efforts within the private sector. In thispiece, Couch reflects on […]

Five Years in OSINT: Reflections on Professional Growth in a Fast-Changing Field

By Sandy M / January 11, 2024

Have you ever heard people say, “if you know, you know; and if you don’t, you don’t”? OSINT (open-source intelligence) is kind of like that.

Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

By Daniel Clemens / December 6, 2023

[First printed in the December 2023 edition of Security Technology] 

Scroll to Top