Featured
How can businesses protect themselves from dark web threats?
Searchlight Cyber CEO and Co-Founder, Ben Jones
The same threats posed by the dark web to businesses and individual create opportunities for cybersecurity and investigation teams. In this final episode in the series, we invite CEO and Co-Founder, Ben Jones back to talk about why he founded Searchlight Cyber and explain how monitoring the dark web for attributes linked to your external threat surface, such as domains, IP addresses, and employee credentials, can help you spot the earliest signs of criminals targeting your business and resolve risks before they turn into costly incidents.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
All episodes
-
What is the dark web (and why should cybersecurity professionals care about it)?
Searchlight Cyber CEO and Co-Founder, Ben Jones
In the first video of our 12-part series, Searchlight Cyber’s CEO and Co-Founder explains what the dark web is and the threats posed by criminals operating in this hidden part of the internet – plus how it can also present opportunities for security and criminal investigation teams.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
How does the dark web work?
Searchlight Cyber CTO and Co-Founder, Dr. Gareth Owenson
As the word “dark” hints at, the dark web refers to a part of the internet that is in the shadows and inaccessible through regular search engines or internet browsers. But how does it work? There’s no better person to answer this question than Dr. Gareth Owenson, CTO and Co-Founder of Searchlight Cyber and a world leader in Tor dark web research.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
What are the risks if your business’s information ends up on the dark web?
Searchlight Cyber Head of Threat Intelligence, Luke Donovan
If your company’s information ends up on the dark web it’s more than just a data leak, it’s potentially an open door to a major cyber incident. To help us understand the risks of falling victim to breaches, leaks, and vulnerabilities – and how exposed data can be used to launch a cyber attack – we’re joined by Luke Donovan, Head of Threat Intelligence at Searchlight Cyber.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
How do ransomware groups operate on the dark web?
Searchlight Cyber Head of Threat Intelligence, Luke Donovan
Do ransomware groups operate like a business? That’s the question we ask Luke Donovan, Head of Threat Intelligence at Searchlight Cyber – helping us understand how ransomware groups use the dark web to plan attacks, communicate anonymously, profit from their stolen data, and, in some cases, even maintain dedicated human resources teams.
-
Who uses the dark web and why - are there any positive uses of the dark web?
Searchlight Cyber CEO and Co-Founder, Ben Jones
Headlines often shine a light on the criminal applications of the dark web, but is that the full story? Ben Jones, CEO and Co-Founder of the dark web intelligence company looks into the ethical applications for anonymous networks such as Tor – from providing safe and private spaces for whistleblowers to protecting those living under oppressive regimes.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
What’s the difference between I2P and Tor? Are there other dark webs?
Searchlight Cyber CTO and Co-Founder, Dr. Gareth Owenson
Despite its recent rise in popularity, I2P has existed as long as Tor. In this webinar, Dr. Gareth Owenson, CTO and Co-Founder of Searchlight Cyber, breaks down the differences between I2P, Tor, Lokinet, Zeronet, and the multiverse of anonymity networks that exist – and shares why certain darknets rise to prominence while others remain in the shadows.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
Where items are bought and sold on the dark web?
Searchlight Cyber Head of Threat Intelligence, Luke Donovan
The dark web is home to many such digital black markets that operate largely in the same way to e-commerce sites we use everyday. However, unlike these familiare sites, the dark web is far more volatile, with new markets closing and opening all the time. In this webinar, Luke Donovan, Head of Threat Intelligence at Searchlight Cyber, guides us through some of the autoshops and escrow marketplaces you should be monitoring.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
How do hackers use the dark web?
Searchlight Cyber Threat Intelligence Engineer, Joe Honey
There’s ‘no honour among thieves’, so how do cybercriminals monetize their illicit activities while evading detection from law enforcement on the dark web? Joe Honey, Threat Intelligence Engineer at Searchlight Cyber joins us to explain how hackers use the dark web, master their ‘craft’, and how security teams, can investigate and defend against the attacks from these threat actors.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
What role does cryptocurrency play on the dark web?
Searchlight Cyber Head of Threat Intelligence, Luke Donovan
Are dark web purchases guaranteed? How anonymous are cryptocurrency transactions in these shadowy corners of the internet? And how do criminals turn digital coins into spendable cash? (after all, you can’t buy a sports car with crypto – yet.) To tackle these questions, we’ve invited back Searchlight Cyber’s Head of Threat Intelligence to break down the dark web’s underground economy.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
Why can't law enforcement just close the dark web for good?
Searchlight Cyber CTO and Co-Founder, Dr. Gareth Owenson
Given that the dark web is primarily used to facilitate illicit activities (according to research, 65% of searches on the dark web are for explicitly illegal content), you might wonder why can't we simply shut it down? While this may seem like a straightforward solution to tackle the rampant sales of illegal goods, data, and organized crime, the answer isn’t so simple. Over to Dr. Gareth Owenson, Co-Founder and CTO of Searchlight Cyber, to explain more.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
-
How does Searchlight gather data from the dark web?
Searchlight Cyber Head of Product, David Osler, and Lead Data Engineer, David Andreas
What are the different methods organizations can use to crawl and scrape data from the dark web to capture sensitive information, such as the auctioning of vulnerabilities or employees advertising insider access on forums - ideally before threat actors erase the evidence? We speak with Head of Product at Searchlight Cyber, Dave Osler and Lead Data Engineer, David Andreas, to understand the pros and cons of the different approaches security and investigation teams can leverage to defend themselves against threats on the dark web.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011 -
How can businesses protect themselves from dark web threats?
Searchlight Cyber CEO and Co-Founder, Ben Jones
The same threats posed by the dark web to businesses and individual create opportunities for cybersecurity and investigation teams. In this final episode in the series, we invite CEO and Co-Founder, Ben Jones back to talk about why he founded Searchlight Cyber and explain how monitoring the dark web for attributes linked to your external threat surface, such as domains, IP addresses, and employee credentials, can help you spot the earliest signs of criminals targeting your business and resolve risks before they turn into costly incidents.
This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011