Resources

We’re passionate about security and technology — and we’re leading the charge in threat intelligence to revolutionize them all. Some of these articles cover research from our team of world-class analysts or advancements in our unique technology.

White Paper

WHITE PAPER

Protecting Your Brand With Security Intelligence

WHITE PAPER

The Security Intelligence Graph: Inside Recorded Future’s Methodology and Patented Technology

WHITE PAPER

Supercharging GRC Solutions With Threat Intelligence

Reports

REPORT

Operationalizing Threat Intelligence With a Complete Solution

REPORT

The Top 10 Vulnerabilities Used by Cybercriminals

REPORT

Forrester Top Cybersecurity Threats in 2019

Webinar

WEBINAR

Advanced Query Builder: Go Beyond Basic Analysis With Recorded Future

WEBINAR

Bridging the Gap Between Threat Intelligence and Third-Party Risk

WEBINAR

Targets of Opportunity: Why State and Local Governments Are Under Attack

Cyber Daily

Blog Posts

Moving Toward a Security Intelligence Program

Moving Toward a Security Intelligence Program

Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs

Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs

Your Brand Is a Target: How to Protect Your Reputation With Security Intelligence

Your Brand Is a Target: How to Protect Your Reputation With Security Intelligence

Research

Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs

Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs

Your Organization’s Network Access Is King: Here’s What to Do About It

Your Organization’s Network Access Is King: Here’s What to Do About It

Joker’s Stash Upgrades With Large SSN Offering and Support Infrastructure

Joker’s Stash Upgrades With Large SSN Offering and Support Infrastructure

Podcasts

Traveling the Globe With Threat Intelligence

Traveling the Globe With Threat Intelligence

Threat Hunting, Mentoring, and Having a Presence

Threat Hunting, Mentoring, and Having a Presence

From Infamous Myspace Wormer to Open Source Advocate

From Infamous Myspace Wormer to Open Source Advocate

Grader