skip to top

Resources

Featured

covid19 threat intelligence

Securing Business with Human Intelligence

The COVID-19 crisis has had a tremendous impact on the world and, overnight, organizations were faced with the disruption of operations and a surge of emerging threats. Globally, systems were disrupted and ties were severed.

Understand how we used Media Sonar to support human intelligence and risk management planning related to:

  • Third-Party & Supply Chain Risks
  • Insider Threats While Working From Home
  • Emerging Cybersecurity Threats
  • Physical Security for Facilities

Posts

natural language processing with osint
OSINT Advances With Natural Language Processing
Natural Language Processing is a form of machine learning that allows for the teaching of context to a data processing program. Its goal is to enable the rough creation of a human-like understanding of language. While it will not completely replace traditional keyword searching at this point - it will be a bolstering factor to efficacy and relevancy in OSINT investigations.
dark web 1
The Hidden and Visible Elements of OSINT: Part 3
Beyond private conversations, which are not legally accessible without warrants if at all, there are hidden data sources that live on what is called the Dark Web. The Dark Web is an unconnected collection of private spaces online where communication, sharing, and transactions can often occur in plain sight. It has been corrupted though, and security professionals and law enforcement are taking great interest in this type of activity.
osint public conversations
The Hidden and Visible Elements of OSINT: Part 2
There is a lot out there in terms of public conversations. People use the Internet to communicate everything, even beyond the boundaries of what is often acceptable in regular society. OSINT investigators will want to capture all conversations and interactions surrounding an event for a threat actor they are investigating.
hidden and visible elements of the internet using osint
The Hidden & Visible Elements of OSINT: Part 1
The investigative process requires the right lens, and you need to know where to start looking. OSINT techniques uncover information about malicious threat actors, possible threats, or crimes that have occurred in the conversations and breadcrumbs that people leave behind on the Internet in the commission of, or in relation to, the acts.
osint investigation techniques
OSINT Success: Efficacy While Remaining Legal and Ethical
What was once the domain of highly specialized teams even half a decade ago, the collection and utilization of OSINT data as a function of security is now becoming a critical component of overall threat intelligence for both corporate and cybersecurity teams. With this rise in priority has come the expansion of teams and an influx of new OSINT practitioners.
due diligence and background investigations
Ins & Outs of Due Diligence using OSINT
All organizations conduct some form of due diligence. It enables decision-makers to identify relationships that will serve in the best interests of their shareholders, customers, employees, and brand. Incorporating OSINT into your due diligence process will be key to getting the information you need.

Papers & Reports

osint best practices legal osint ethical osint

Understand the legal & ethical best practices for gathering OSINT and learn how to keep personal bias and civil liberties at top of mind.

open source intelligence across the surface deep and dark web

Distinguish between the Surface, Deep, and Dark Web and learn the importance of Internet investigations in assessing public and private risk.

dark web markets corporate security public safety

Understand the risks that Dark Web marketplaces create, and how they endanger public safety and corporate security.

the hidden and visible elements of OSINT

Distinguish between public and private conversations and how to manually and automatically query the Surface, Deep and Dark Web.

Case Studies

covid19 threat intelligence

Understand how we used Media Sonar to support human intelligence and risk management planning related to:

  • Third-Party & Supply Chain Risks
  • Insider Threats While Working From Home
  • Emerging Cybersecurity Threats
  • Physical Security for Facilities