Blog
Top 10 Risky ASNs
Good versus evil. It’s a battle as old as time. If you’ve ever spent more than five minutes on social media, it’s no secret that the internet has long been the home field for both sides of this existential rivalry. But for every web hero out there, it feels...
Announcing New Partnerships: ThreatQuotient, Mindflow and Datastreamer
Cybersecurity is a team sport and partnerships are a key component of a healthy security ecosystem. That’s why we are delighted to announce several new alphaMountain partnerships and integrations that bring alphaMountain’s real-time URL threat intelligence and...
The Unlikely Link Between URL Classification and Cruise Control
We recently returned from London where we exhibited at InfoSecurity Europe. One of our main objectives in attending Europe’s largest cybersecurity conference was to educate people on the state of the art in web filtering and URL threat intelligence. The...
How To Enrich Threat Investigations In Maltego with alphaMountain
Maltego is a popular intelligence platform used by professionals in the cybersecurity, law enforcement and trust and safety industries. Common use cases for maltego include persons of interest investigations, security research and cyber threat investigations. ...
Can an AI Chatbot Be Used for Threat Investigations?
Artificial intelligence has been all over the headlines since OpenAI’s launch of ChatGPT in late 2022. With the promise of accelerated productivity, this global digital arms race has only increased in interest, activity and investment over the past year and a half....
Customer Spotlight: Interview with Kunal Agarwal, CEO, dope.security
The cybersecurity industry has developed a reputation of sorts for rolling out complex solutions to complex problems. With many of these solutions, the user experience takes a back seat to their features and capabilities, often leaving security practitioners to trudge...