skip to top

Resources

Featured

insider threat investigation

Private Healthcare Organization Gets Proactive About Insider Threats

A private company operating hospitals, care centers, and medical practices across multiple North American cities was having a hard time combatting a high number of cybersecurity threats. Their information security team had a strong defense but were blind to threats that happened outside their system.

They turned to Media Sonar, an OSINT investigation and threat detection platform, in order to quickly search consolidated open-source data on the Surface, Deep and Dark Web, and actively listen for indicators of insider threats that were a current or potential future risk to their assets.

Papers & Reports

reduce OSINT false positives

Learn techniques to minimize and reduce the impact of false positives and how Natural Language Processing and Machine Learning are evolving to create a human-like, contextual understanding of language to combat alert fatigue.

open source intelligence across the surface deep and dark web

Distinguish between the Surface, Deep, and Dark Web and learn the importance of Internet investigations in assessing public and private risk.

osint best practices legal osint ethical osint

Understand the legal & ethical best practices for gathering OSINT and learn how to keep personal bias and civil liberties at top of mind.

the hidden and visible elements of OSINT

Distinguish between public and private conversations and how to manually and automatically query the Surface, Deep and Dark Web.

covid19 threat intelligence

Understand how we used Media Sonar to support human intelligence and risk management planning related to third-party & supply chain risks, insider threats while working from home, emerging cybersecurity threats, and physical security for facilities.

dark web markets corporate security public safety

Understand the risks that Dark Web marketplaces create, and how they endanger public safety and corporate security.

Case Studies

insider threat investigation

A private company operating hospitals, care centers, and medical practices across multiple North American cities was having a hard time combatting a high number of cybersecurity threats. Their information security team had a strong defense but were blind to threats that happened outside their system.

Understand how their team used Media Sonar and open-source data to close the external threat intelligence gap.

Posts

osint alert fatigue
Combating OSINT Alert Fatigue – 4 Tips & Tools
Due to the high volume of false positives, many security teams can suffer alert fatigue which can lead to less than ideal behavior. Analysts can begin to miss, ignore, or turn off alerts.  Although this behavior is clearly understandable, it can lead to teams missing important indicators of genuine threats.
natural language processing with osint
OSINT Advances With Natural Language Processing
Natural Language Processing is a form of machine learning that allows for the teaching of context to a data processing program. Its goal is to enable the rough creation of a human-like understanding of language. While it will not completely replace traditional keyword searching at this point - it will be a bolstering factor to efficacy and relevancy in OSINT investigations.
dark web 1
The Hidden and Visible Elements of OSINT: Part 3
Beyond private conversations, which are not legally accessible without warrants if at all, there are hidden data sources that live on what is called the Dark Web. The Dark Web is an unconnected collection of private spaces online where communication, sharing, and transactions can often occur in plain sight. It has been corrupted though, and security professionals and law enforcement are taking great interest in this type of activity.
osint public conversations
The Hidden and Visible Elements of OSINT: Part 2
There is a lot out there in terms of public conversations. People use the Internet to communicate everything, even beyond the boundaries of what is often acceptable in regular society. OSINT investigators will want to capture all conversations and interactions surrounding an event for a threat actor they are investigating.
hidden and visible elements of the internet using osint
The Hidden & Visible Elements of OSINT: Part 1
The investigative process requires the right lens, and you need to know where to start looking. OSINT techniques uncover information about malicious threat actors, possible threats, or crimes that have occurred in the conversations and breadcrumbs that people leave behind on the Internet in the commission of, or in relation to, the acts.