Transforming Open Source Data into Actionable Intelligence.
  • Parent page
  • Platform
  • Partners
    • Partnering with Us
    • Our Partners
    • Partner Portal
  • Company
    • About
    • Trust Center
    • Support
    • Careers
  • Resources
    • Library
    • Free Tools
    • Blog
    • Training
  • Contact
Platform The Horizon® Platform

Enterprise investigation platform specializing in open source intelligence.

Components
read more
Identity Rapid Triage
read more
Investigate Link Analysis
read more
Monitor Ongoing Analysis
Use Case
  • Law Enforcement
  • Government
  • Corporate Security
  • Fraud and Risk
  • Finance and Insurance
  • Cybersecurity and Threat Intelligence
  • Integrations
  • SocialNet® API
  • Platform
  • Partners
  • Company
  • Resources
  • Contact
Platform The Horizon® Platform

Enterprise investigation platform specializing in open source intelligence.

Components
read more
Identity Rapid Triage
read more
Investigate Link Analysis
read more
Monitor Ongoing Analysis
Use Case
  • Law Enforcement
  • Government
  • Corporate Security
  • Fraud and Risk
  • Finance and Insurance
  • Cybersecurity and Threat Intelligence
  • Integrations
  • SocialNet® API
  • Partnering with Us
  • Our Partners
  • Partner Portal
  • About
  • Trust Center
  • Support
  • Careers
  • Library
  • Free Tools
  • Blog
  • Training

Resources

Blog
Guides
Topics
Filter
Blog
Guides
Topics
Dark Web
Know Your Customer
Cybersecurity
Monitor
Financial Institutions
Criminal Investigations
Technical Tips and Training
News and Commentary
Solutions
Artificial Intelligence
Corporate Security
Fraud and Risk
Government
Finance and Insurance
Law Enforcement
OSINT
Security and Compliance

9 biggest corporate security trends shaping modern risk management

Blog
06 Aug 2025
View 9 biggest corporate security trends shaping modern risk management

Corporate security in banking: 12 best practices

Blog
24 Jul 2025
View Corporate security in banking: 12 best practices

14 essential corporate mobile security requirements

Blog
24 Jul 2025
View 14 essential corporate mobile security requirements

Corporate security monitoring: 9 key benefits

Blog
16 Jul 2025
View Corporate security monitoring: 9 key benefits

12 ways to improve corporate security awareness

Blog
30 Jun 2025
View 12 ways to improve corporate security awareness

Information security policy: 14 key elements for corporate security

Blog
27 Jun 2025
View Information security policy: 14 key elements for corporate security

22 best practices for effective corporate security investigations

Blog
27 Jun 2025
View 22 best practices for effective corporate security investigations

8 best social media monitoring tools for law enforcement (2026)

Blog
18 Jun 2025
View 8 best social media monitoring tools for law enforcement (2026)

Social media threat monitoring: 10 effective strategies in 2026

Blog
13 Jun 2025
View Social media threat monitoring: 10 effective strategies in 2026

Corporate data security: 10 best practices for protecting sensitive business information

Blog
10 Jun 2025
View Corporate data security: 10 best practices for protecting sensitive business information

8 strategies to strengthen your corporate security plan (in 2026)

Blog
10 Jun 2025
View 8 strategies to strengthen your corporate security plan (in 2026)

ShadowDragon introduces Horizon® Identity - eliminate complexity

Blog
02 Jun 2025
View ShadowDragon introduces Horizon® Identity - eliminate complexity

What is the OSINT Framework?

Blog
25 Apr 2025
View What is the OSINT Framework?
OSINT techniques

OSINT techniques: Complete list of expert tactics for investigators

Blog
10 Apr 2025
View OSINT techniques: Complete list of expert tactics for investigators
OSINT tools

24 best OSINT tools for advanced intelligence gathering in 2026

Blog
10 Apr 2025
View 24 best OSINT tools for advanced intelligence gathering in 2026

Just do... OSINT: A short primer on identifying counterfeits online

Blog
04 Apr 2025
View Just do... OSINT: A short primer on identifying counterfeits online

The slow collapse of critical thinking in OSINT due to AI

Blog
03 Apr 2025
View The slow collapse of critical thinking in OSINT due to AI

Unmasking the fentanyl trade in illicit online marketplaces

Blog
03 Mar 2025
View Unmasking the fentanyl trade in illicit online marketplaces

Spotting the signs: How social media and the dark web can reveal human trafficking activity

Blog
14 Jan 2025
View Spotting the signs: How social media and the dark web can reveal human trafficking activity

Navigating election monitoring: Insights on security, disinformation, and social media trends

Blog
17 Oct 2024
View Navigating election monitoring: Insights on security, disinformation, and social media trends

Smart security: Fighting financial fraud with open source intelligence

Blog
16 Oct 2024
View Smart security: Fighting financial fraud with open source intelligence

How does OSINT make it hard for cybercriminals to work?

Blog
09 Oct 2024
View How does OSINT make it hard for cybercriminals to work?

Surprising ways OSINT is used for good

Blog
25 Sep 2024
View Surprising ways OSINT is used for good

How failing faster helps catch criminals: Exploring OSINT for law enforcement

Blog
18 Sep 2024
View How failing faster helps catch criminals: Exploring OSINT for law enforcement

Unpacking OSINT: The power of publicly available information

Blog
11 Sep 2024
View Unpacking OSINT: The power of publicly available information
OSINT investigation challenges

The 13 biggest OSINT investigation challenges

Blog
04 Sep 2024
View The 13 biggest OSINT investigation challenges

Illuminating context with timeline analysis

Blog
29 Jul 2024
View Illuminating context with timeline analysis

Introducing ShadowDragon’s Horizon® Monitor.

Blog
15 Jul 2024
View Introducing ShadowDragon’s Horizon® Monitor.

ShadowDragon partners with SynapseAi to expand influence in Asia Pacific

Blog
26 Jun 2024
View ShadowDragon partners with SynapseAi to expand influence in Asia Pacific

Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

Blog
14 Apr 2024
View Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit
1 2 3
Ready to start the conversation?
Talk to an OSINT expert.
Speak with our team
Resources Blog
  • Platform
  • Partners
  • Company
  • Resources
  • Login
  • Contact
  • Partner Portal
  • Trust Center
  • © 2026 ShadowDragon®. All rights reserved.
  • Privacy Policy
  • Cookie Settings