ShadowDragon (@shadowdragonio) 's Twitter Profile
ShadowDragon

@shadowdragonio

#OSINT Software, Data, Training for Modern Investigations; #OSINTforgood

ID: 3298554018

linkhttp://www.shadowdragon.io calendar_today27-07-2015 20:37:03

1,1K Tweet

2,2K Followers

281 Following

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Webinar alert: Human trafficking is an estimated $236 billion industry globally. ShadowDragon’s newest product feature, Horizon® Identity, helps expose the people and networks behind it with one simple search bar and access to more than 550 publicly available data sources.

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Happy Independence Day everyone!! Today we celebrate the birth of the United States of America - remember what it took for us to get here, and enjoy responsibly. #OSINTforGood

Happy Independence Day everyone!! Today we celebrate the birth of the United States of America - remember what it took for us to get here, and enjoy responsibly. 

#OSINTforGood
ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Security isn’t just a tech problem—it’s a human one. If your corporate awareness training happens once a year, you’re already behind. We break down how to build daily security habits, from phishing simulations to gamified training and breach intel briefings in our latest blog.

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Geopolitical risk ranked as the number 1 risk in 2025 on several surveys posed to industry leaders. With ShadowDragon's advanced link analysis platform and collection tool, SocialNet, users get access to more than 550 publicly available data sources with more than 1,500

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Human trafficking fuels a $236 billion criminal economy — but it leaves digital footprints. Join us on July 17 for an exclusive demo of Horizon® Identity, ShadowDragon’s newest capability that empowers investigators to turn one datapoint into a full identity profile using 550+

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

In our last podcast, we sat down with Melisa Stivaletti, Director of OSINT at Guidehouse, to talk about the growing role of publicly available information (#PAI) and subsequent open source intelligence (#OSINT) in the intelligence community. We talk about the elevation of OSINT

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Unmask the illicit Networks Behind Human Trafficking On July 17, see how Horizon® Identity helps investigators uncover hidden identities and criminal networks using just one search bar to access 550+ publicly available data sources with 1,500 endpoints. Human trafficking is a

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Start every investigation with one question: where’s the evidence, and who touches it? In this checklist below, we walk through just some of the issues for corporate security experts should consider when beginning an investigation. With more than 550 publicly available data

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Insider leaks? Executive threats? Third-party risk? If you’re investigating without #OSINT visibility, you’re flying blind. ShadowDragon's newest product feature, Horizon Identity, brings more than 550 publicly available data sources and 1,500 endpoints to you with a single,

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Most security incidents don’t come out of nowhere - they’re preceded by signals: leaked credentials, spoofed domains, unusual access or forum chatter. Are you seeing them before they escalate? With access to more than 550 publicly available sources and 1,500+ endpoints,

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Red-Teaming with OSINT? Open-Source Intelligence (#OSINT), using publicly available information (#PAI) and commercially available information (#CAI) allows security operations centers (SOCs) of any size to red-team employees or executives to identify security gaps - and

Red-Teaming with OSINT? 

Open-Source Intelligence (#OSINT), using publicly available information (#PAI) and commercially available information (#CAI) allows security operations centers (SOCs) of any size to red-team employees or executives to identify security gaps - and
ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

#OSINT is nothing new, but how we use it is revolutionizing business, security and defense, and even how we think at any level. With more than 400 terabytes of publicly available information created everyday on the internet, ShadowDragon is making sense of the noise and turning

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Mobile access boosts productivity, but it also expands your attack surface. From device authentication to mobile EDR and OSINT threat intelligence, securing mobile endpoints requires a layered approach. Explore 14 corporate mobile security requirements to protect data, devices,

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Threat intelligence is only as valuable as the context it delivers. In 2025, the top threat intelligence tools go beyond surface indicators. They connect infrastructure, identities, behaviors, and threat actors to reveal the full picture, fast. See how the leading tools stack

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

As Newsweek states, open-source intelligence must be elevated to a core pillar of national security—not just a supporting role. Traditional secrecy isn't enough when adversaries are fast, digitally savvy, and relentless. This is why ShadowDragon is doubling down on accessible,

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Join us at Digital Experience 2025! Catch Nico Dekens on October 1st in Arnhem for: "Hunting with OSINT: Identify, Investigate, Monitor and Analyze" Discover how open-source intelligence can empower investigations, reveal hidden patterns, and help you stay ahead of emerging

Join us at Digital Experience 2025! 

Catch Nico Dekens on October 1st in Arnhem for:
"Hunting with OSINT: Identify, Investigate, Monitor and Analyze"

Discover how open-source intelligence can empower investigations, reveal hidden patterns, and help you stay ahead of emerging
ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Still defending the perimeter? Today’s threats move faster, hit harder, and come from every direction: cloud sprawl, supply chain gaps, insider risks, and the blurring line between physical and digital. Staying ahead means shifting your mindset – and your strategy. Explore the

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Visit us at the IAFCI 2025 International Training Conference in Oklahoma City from August 25–29 at Booth 22. See live #OSINT demos built for investigators and risk professional showcasing how to stay ahead of fraud, financial crime, and emerging threats. #CAI #Investigations

Visit us at the IAFCI 2025 International Training Conference in Oklahoma City from August 25–29 at Booth 22.

See live #OSINT demos built for investigators and risk professional showcasing how to stay ahead of fraud, financial crime, and emerging threats.

#CAI #Investigations
ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Corporate security regulations are complex—and waiting until audit season to assess your compliance posture is a risk you can’t afford. With continuous monitoring, automated controls, and OSINT insights, you can move from reactive to proactive, catching issues before they become

ShadowDragon (@shadowdragonio) 's Twitter Profile Photo

Blind spots in your security posture can lead to costly breaches, downtime, and reputational damage. A well-executed corporate security risk assessment gives you visibility into: - What’s at risk - Who’s targeting your assets - How to act before incidents occur Follow our