White Papers

The Digital Footprints of High Net-Worth Individuals: An Underestimated Vulnerability

Domain infringement is when cyber threat actors use brand names within illegitimate web domains to imply affiliation with a brand to deceive end users about who’s behind the...

Read More
Are You Collecting Personal Data Securely?

The EU General Data Protection Regulation (GDPR) includes new requirements and controls on the online processing of personally identifiable information (PII) and large fines i...

Read More
Subdomain Infringement: An Unseen Cyber Threat

Domain infringement is when cyber threat actors use brand names within illegitimate web domains to imply affiliation with a brand to deceive end users about who’s behind the...

Read More
Eight Degrees of Kevin Bacon: Cyber Threat Research Edition

You've heard of ‘Six Degrees of Kevin Bacon,' the game that challenges players to connect the prolific actor with any other actor via their film roles in six steps or less. Wi...

Read More
Cybersecurity in Digital Channels: Financial Services Companies Can Bank on It

Banking and financial services firms live by the critical data they collect—customer account details, financials, card holder data, tax information, transaction data, and mo...

Read More
Using Internet Data Sets to Understand Digital Threats

As businesses adapt to the rapidly changing digital landscape, more customer and business operations are shifting from behind the protection of firewalls to the open internet....

Read More