Podcasts

Episode #5: Data and the DarkWeb. What is it, where is it, and why should we care?

Alison Connolly Halland, DarkOwl’s CBO, and Andrew Bayers, Head of Threat Intel at Resilience, discuss the ways data is collected on the darknet and the tools protecting business information.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #5: Data and the DarkWeb. What is it, where is it, and why should we care?

What is the dark web specifically and why should you care? These interviews look to answer these questions from two vantage points. The first interview is from the perspective of a company that serves security professionals – front line defenders using data from the dark web to inform their day-to-day operations. The second interview is from the perspective of an “in the trenches” incident responder…with an important twist. This leader not only uses threat intelligence to protect his own company, but to help a large portfolio of additional organizations stay ahead of the bad guys.

On the go? Listen to our podcast on your favorite platforms.

You might also like

Resilience Names James C. Riviezzo Head of North American Distribution and Strategy

Resilience Names James C. Riviezzo Head of North American Distribution and Strategy

New York, NY, August 6, 2025 – Resilience, the leading cyber risk company, announced the appointment of James C. Riviezzo as Head of North American Distribution and Strategy. This key hire supports Resilience’s evolution in the cyber risk market as the company continues to pair top-rated cyber insurance and tech E&O policies with its award-winning […]

Your cyber insurance policy could be a target

Your cyber insurance policy could be a target

Organizations invest heavily in cyber insurance policies to shield their businesses from evolving threats, but many overlook a critical vulnerability: the security of the insurance policy documents themselves. While these policies are designed to protect you from cyber threats, they can become powerful weapons when they fall into the wrong hands. Over the past year, […]

A complete guide to domain spoofing

A complete guide to domain spoofing

Domain spoofing is a cyberattack technique most commonly used in phishing and fraud, where criminals impersonate a legitimate organization’s domain name to deceive users. Think of it as digital identity theft at scale: Attackers make fraudulent emails or websites appear as if they originate from your trusted company domain, tricking victims into revealing sensitive data, […]

Cyber resiliency starts here.

Request Demo