Author Archives: Eric Clay

what is digital risk monitoring

Digital Risk Monitoring: A Quick Introduction

Digital Risk Monitoring: A Quick Introduction It’s no secret that cyber threats are proliferating. In just the past 12 months, major ransomware attacks such as against Colonial Pipeline and against the U.S. meat industry have resulted in significant real-world impacts. … Read More

what is domain monitoring

What Is Domain Monitoring?

What Is Domain Monitoring? Have you ever received an email from a colleague but in your gut felt that something was off? The spelling or grammar in the body of the message may have looked off, or the signature line … Read More

Dark web vs deep web

Dark Web vs Deep Web: What’s the Difference?

Dark Web vs Deep Web: What’s the difference? Like billions of others, you probably use the Internet to find answers, buy consumer goods, communicate with others, enjoy leisure activities, and meet your professional responsibilities. But how much do you really … Read More

dark web threat intelligence

Dark Web Threat Intelligence: A Quick Guide

Dark Web Threat Intelligence: A Quick Guide Building cyber threat intelligence capabilities has never been more important than in 2021. Attacks against businesses of all sizes are increasing rapidly. At the same time, the criminal underground is larger and more … Read More

Information Leakage: What you need to Know

Information Leakage: What You Need to Know Information leakage poses a serious problem for thousands of companies around the world. Many software startups and even large, established enterprise organizations have difficulty ensuring that technical data is kept under lock and … Read More

dark web monitoring cover

Dark Web Monitoring: A Quick Guide

Dark Web Monitoring: A Quick Guide Organizations are concerned about the proliferation of threats on the dark web. Even as cybersecurity budgets have increased dramatically over the past decade, ransomware, phishing and other cyber threats have grown in intensity and … Read More

Digital Risk Protection Guide

Digital Risk Protection: The Complete Guide

Digital Risk Protection: The Complete Guide Cybersecurity no longer stops at the network boundary. The past decade has seen the proliferation of online threats, many of which companies are entirely unaware of. User’s credentials are sold on the dark web … Read More