skip to top

Resources

Posts

I2P_network_topology
Is I2P the New Tor?
It is not unusual for Dark Web markets to appear in many forms across different networks and platforms to expand their reach. More recently, however, markets are leaving the Tor network entirely and relaunching their illicit businesses in places like Discord, Telegram, and some are even considering I2P.
Triangle20Rectangle
Gathering Risk Intelligence For Your Facilities
For physical security professionals managing safety and security risks to locations and facilities, this might involve access control, camera systems, or even drones. But consider this: The Internet is undeniably where people go to communicate. An offensive approach using Internet chatter and data from social media, news, blogs, and the Dark Web is necessary to mitigate risks to human lives and protect brand interests.
Tyler Logtenberg Vice President of Product Management Media Sonar
Media Sonar VP of Product Management Shares Insight on Cybertech
“At a global conference like this, especially considering the size, people unify on the same priorities and open their eyes to what different countries are experiencing. It helps the entire industry because now the whole world is thinking about things that they might not have otherwise considered”. " - Tyler Logtenberg
2019 data breaches
Most Impactful Data Breaches of 2019
Data breaches have been on a consistent rise year after year. Security teams need to implement a more robust strategy in order to detect data breaches and investigate further should one occur. Although it is forecasted that data breaches will continue to rise and become more complex in nature, there is still time to take control in 2020. 
Google-Map-US_10
Sharing Location in the Age of Privacy
Law enforcement and security professionals who previously relied on geofencing to identify threats of violence or to manage a crisis have needed other ways to pinpoint the location of posts online.

Papers