Illustration showing the various layers: Surface, Deep and Dark Web.

Surface Web is Only the Tip of the Iceberg

Surface, Deep and Dark Web – Understand the various layers of the Internet and what the consequences are for your investigations and decision makings. … Read More

Illustration showing the various layers: Surface, Deep and Dark Web.

5 Ways to Protect Your OSINT Investigations

5 ways to protect your OSINT investigations – Understand how OSINT hunters can prevent being hunted and how to not jeopardize their OSINT investigations. … Read More

Explainable AI for Sentiment Analysis

Introduction to Explainable AI for Sentiment Analysis

Get a better understanding of how explainable AI for sentiment analysis can solve two problems in the world of information collection and processing. … Read More

Explainable AI for Sentiment Analysis
Social media platforms for SOCMINT.

How to Run Social Media Investigations

Find out what open-source intelligence (OSINT) is and why an OSINT strategy and framework is essential for multiple analysis tasks. … Read More

Social media platforms for SOCMINT.
Overview of various OSINT tools.

15 Powerful OSINT Tools for Analyzing Organizations

Find out what open-source intelligence (OSINT) is and why an OSINT strategy and framework is essential for multiple analysis tasks. … Read More

A drawing of our Data Leakage Detection dashboard showing sample data.

Data Leakage Best Practices for Your Organization

What is data leakage and how can you prevent it? In this article, we define data leakage and show you different ways to handle it. … Read More

A drawing of our Data Leakage Detection dashboard showing sample data.

What is OSINT and how is it Used?

Find out what open-source intelligence (OSINT) is and why an OSINT strategy and framework is essential for multiple analysis tasks. … Read More

Structure of a federated search which unifies various data sources.

What is Federated Search and Why is it Important?

Traversals explains what a federated search is and why this service is a powerful feature and advantage for your analysts. … Read More

Structure of a federated search which unifies various data sources.

Moving Target Defense for our Intelligence Platform

Moving Target Defense (MTD) is considered today to be the most effective innovation in the field of cybersecurity.  Until now, IT infrastructures were regarded as unchangeable and stationary. A great deal of effort has been invested in protecting these infrastructures … Read More

A block diagram showing an exemplary pipeline for creating a secure artifact with the CI tool Concourse.

Secure Software Supply Chain for our Intelligence Platform

The ongoing introduction and implementation of the DevOps concept and the associated automation of software creation and delivery has made the software supply chain a business-critical unit in companies. What many publications and blog posts that deal with DevOps rarely … Read More

A block diagram showing an exemplary pipeline for creating a secure artifact with the CI tool Concourse.