{"id":76070,"date":"2024-03-09T12:17:09","date_gmt":"2024-03-09T04:17:09","guid":{"rendered":"https:\/\/version-2.com\/?p=76070"},"modified":"2024-03-04T12:20:03","modified_gmt":"2024-03-04T04:20:03","slug":"how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/03\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\/","title":{"rendered":"How to use dark web monitoring: a talk with Mary D\u2019Angelo"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"76070\" class=\"elementor elementor-76070\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Today is just like any other day at the office. You are going through emails and laying out plans for your company&#8217;s upcoming big project when suddenly, your screen freezes. None of the troubleshooting steps work. Quickly, your IT team becomes anxious; the company&#8217;s network has stopped working. The reason is a security breach tied to stolen credentials from RIPE, an organization that assigns IP addresses across numerous countries.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This situation is similar to what Orange Spain experienced, suffering an outage due to a hacker who improperly accessed their RIPE account. Researchers at Resecurity have noticed <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/looted-ripe-credentials-for-sale-on-dark-web\" target=\"_blank\" rel=\"noopener\">a troubling trend<\/a>: the dark web now houses millions of stolen network operator credentials, which cybercriminals are poised to misuse.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The dark web serves as a hidden space where these stolen credentials remain unseen. It is also where attackers coordinate their plans and recruit accomplices for future breaches.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For businesses, keeping an eye on the dark web is vital. It helps uncover new threats and trends as they arise.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Equally important are cybersecurity practices. They shield businesses from an increasing array of cyber threats.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">By combining dark web monitoring with solid cybersecurity, businesses can establish a protective strategy to remain secure.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">That&#8217;s why we talked with Mary D&#8217;Angelo, a leading Cyber Threat Intelligence and Dark Web Advisor. We discussed how the dark web works and explored why businesses might need dark web monitoring.<\/p><h2 id=\"the-interviews-highlights\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The interview&#8217;s highlights<\/h2><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The deep web makes up 80% of the internet, while the dark web and clear web each make up 10%.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The US Navy originally created the Tor network for good reasons, but now less than 1% is for whistleblowers and journalists.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Dark web monitoring lets businesses see planned attacks, indicating the immediate need for protection.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Ransomware groups are growing, and threat actors are switching to platforms like Telegram.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies should combine dark web monitoring and cybersecurity practices for early threat detection.<\/p><\/li><\/ul><h2 id=\"key-insight-1-the-clear-web-makes-up-only-10-of-the-internet\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #1: the clear web makes up only 10% of the internet<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer:<\/b> To start, what is the dark web?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>When I discuss the dark web, I refer broadly to its distinction from the deep web and the clear web. The dark web is a segment of the internet accessible only through specialized software, typically Tor, which I&#8217;ll mostly reference. It&#8217;s because Tor is the most commonly used. The deep web and clear web are other internet segments. The clear web includes anything findable via Google and other search engines. The deep web, while still accessible through search engines, comprises sites that are very hard to enter. Statistics indicate that the deep web constitutes 80% of the internet, with the dark web and the clear web each accounting for only 10%.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/6T6YkXZenbLmStRyHgH1rd\/2d4c5f562e9618ac1001b79850f6d145\/2_1400x504.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Dark web takes up to 10% of the internet\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>The dark web ensures anonymity and is technically limitless. How does the Onion Router contribute to this anonymity?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> The Onion Router, a type of software made to connect to the dark web, encrypts messages in multiple layers, similar to an onion. These messages, when sent, pass through various relays or nodes, mixing up communications. Upon receiving a message, each relay cannot trace its origin, making it extremely difficult to track the messages and users&#8217; activities.<\/p><h2 id=\"key-insight-2-the-original-purpose-of-the-dark-web-initiated-by-the-us-navy-now-makes-up-just-1-of-its-current-content\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #2: the original purpose of the dark web, initiated by the U.S. Navy, now makes up just 1% of its current content<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Could you explain the legal and illegal aspects of the dark web?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> It&#8217;s a common misconception that the dark web is entirely illegal. Initially, the Tor network was developed by the US Navy research team to enable secure communications.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The primary purpose of the dark web was to assist journalists and whistleblowers in remaining anonymous and using encrypted messaging on a privatized platform. Over time, it has evolved to host a significant amount of illegal activity.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">It&#8217;s estimated that 40% of the dark web is comprised of child sexual exploitation material, with less than 1% now dedicated to whistleblower and journalism activities. The majority involves illegal marketplaces, threat actor forums, ransomware groups, and similar entities.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer:<\/b> But the dark web also has positive uses for privacy and free speech. Can you discuss them?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>The dark web is valuable for media organizations and individuals in censored countries, providing a secure communication channel. Organizations like ProPublica use the dark web for secure communications, offering a platform for whistleblowers and those reporting from repressive regimes.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Considering its origins, does the dark web offer more security than platforms like Amazon?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>The comparison depends on what you mean by security. The dark web provides anonymity, encrypted messaging, and privacy, even for websites. Users on the dark web enjoy encrypted and anonymized communication unseen by others. Conversely, Amazon tracks all user information, making the dark web, in some respects, more secure. However, this anonymity also contributes to the prevalence of illegal activities.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Is regulation of the dark web a significant challenge?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Yes, law enforcement faces considerable difficulties in tracking down illegal activities due to the dark web&#8217;s structure. Although recent efforts have improved, the process is complex and time-consuming.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer:<\/b> Can dark web marketplaces be shut down successfully?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Marketplaces like Silk Road and Alpha Bay have been taken down by law enforcement, involving extensive international investigations. Often, the downfall of these sites is due to the carelessness of threat actors. However, new marketplaces frequently emerge, creating a continuous cat-and-mouse game between law enforcement and dark web users.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>How does law enforcement investigate the dark web?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> Investigations involve collaboration with various agencies and platforms like ours that can index and search the dark web efficiently. Law enforcement builds cases on threat actors, tracking their movements and communications, often capitalizing on their mistakes to dismantle operations.<\/p><h2 id=\"key-insight-3-dark-web-monitoring-helps-to-detect-the-threat-on-its-planning-stage\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #3: dark web monitoring helps to detect the threat on its planning stage<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>How did your interest in the dark web begin?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>My journey into the dark web began with my background in cybersecurity and network detection. Joining Searchlight Cyber, I deepened my understanding of threat intelligence and the significance of dark web monitoring to identify potential security threats to organizations.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/4uU5UGtiZZ653tqU7hMd3V\/736418a25faeed9274b371a56e2f5959\/3_1400x635.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Dark web is a hub for threat actors to plan attacks\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Why is it important for businesses to monitor the dark web?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>The dark web is a hub for threat actors to plan attacks. Dark web monitoring allows businesses to detect potential threats early in the planning stage, giving them more time to prevent attacks.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">&#8220;You can also try NordLayer&#8217;s ThreatBlock to prevent threats. It automatically blocks access to harmful websites, making it easier to avoid entering a malicious site. You won&#8217;t see harmful ads and pop-ups, and you will be prevented from accessing websites linked to illegal activities or those marked as unsafe in trusted databases. This tool makes life easier.&#8221;<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Martyna Gaidel\u0117, Product Marketing Manager at NordLayer<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%22You%20can%20also%20try%20NordLayer's%20ThreatBlock%20to%20prevent%20threats.%20It%20automatically%20blocks%20access%20to%20harmful%20websites,%20making%20it%20easier%20to%20avoid%20entering%20a%20malicious%20site.%20You%20won't%20see%20harmful%20ads%20and%20pop-ups,%20and%20you%20will%20be%20prevented%20from%20accessing%20websites%20linked%20to%20illegal%20activities%20or%20those%20marked%20as%20unsafe%20in%20trusted%20databases.%20This%20tool%20makes%20life%20easier.%22Martyna%20Gaidel%C4%97,%20Product%20Marketing%20Manager%20at%20NordLayer&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fdark-web-monitoring-for-business\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>So how can organizations monitor the dark web effectively?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Companies like Searchlight Cyber provide services to monitor the dark web safely and efficiently, helping businesses to protect themselves without risking exposure to malicious content.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/4xlIhpuWCYwdFR7rirMZjr\/a98b34102d6cd35a7e76a281d8880ec3\/1_1400x1142.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"7 stages of cyber-attacks\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Can you share a success story related to dark web monitoring?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> Our human intelligence team does a lot of the undercover work. Accessing some dark web sites is tough; it requires specific permissions. Our team managed to enter these sites and found someone selling domain access control credentials for a large US airline. They didn&#8217;t name the airline to avoid detection but shared details like the revenue size, location, and access type. High pricing often indicates legitimacy. Upon discovering this, I contacted the airline&#8217;s security team to alert them, despite them not being our client. We then discussed the intelligence, which was new to them, and together, we devised a plan to enhance their security.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>That&#8217;s impressive. What security measures do you generally recommend to introduce?\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> We generally suggest enforcing multi-factor authentication (MFA) across all platforms. The approach depends on the attack type, but ensuring MFA is in place is crucial so that only authorized individuals have access.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">&#8220;Multi-factor authentication (MFA) is an essential part of NordLayer. However, we advocate for a broader range of <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/multi-factor-authentication-best-practices\/\">multi-layered authentication<\/a> solutions and encourage our customers to implement more comprehensive Zero Trust Network Access (ZTNA) strategies.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Multi-layered network access control minimizes the risks of data breaches and aids in achieving compliance certificates, contributing to business credibility as well.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">My favorite NordLayer features for <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/network-security\/access-control\/\">network access control<\/a> are the Cloud Firewall and Device Posture Security. They are easy to use and powerful solutions, ensuring advanced network access control.&#8221;<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Martyna Gaidel\u0117, Product Marketing Manager<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%22Multi-factor%20authentication%20(MFA)%20is%20an%20essential%20part%20of%20NordLayer.%20However,%20we%20advocate%20for%20a%20broader%20range%20of%20multi-layered%20authentication%20solutions%20and%20encourage%20our%20customers%20to%20implement%20more%20comprehensive%20Zero%20Trust%20Network%20Access%20(ZTNA)%20strategies.Multi-layered%20network%20access%20control%20minimizes%20the%20risks%20of%20data%20breaches%20and%20aids%20in%20achieving%20compliance%20certificates,%20contributing%20to%20business%20credibility%20as%20well.My%20favorite%20NordLayer%20features%20for%20network%20access%20control%20are%20the%20Cloud%20Firewall%20and%20Device%20Posture%20Security.%20They%20are%20easy%20to%20use%20and%20powerful%20solutions,%20ensuring%20advanced%20network%20access%20control.%22Martyna%20Gaidel%C4%97,%20Product%20Marketing%20Manager&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fdark-web-monitoring-for-business\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><h2 id=\"key-insight-4-ransomware-groups-are-hiring-which-means-even-more-attacks-in-2024\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #4: Ransomware groups are hiring, which means even more attacks in 2024<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Have you observed any trends in the dark web, such as an increase in ransomware groups?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Last year, we saw ransomware groups increase their recruitment. This means that they only plan to increase their attacks. They now have larger budgets because they were so successful last year in terms of the ransom payments. And so now they have more purchasing power, they can buy better exploits and better credentials. Bad actors also have their AI tool, called fraud GPT, which can just more easily and quickly make very sophisticated attacks.<\/p><div class=\"InlineRelatedArticles_root__QJQs_\"><p class=\"Text_text__rSWMU InlineRelatedArticles_title__CzOdc Text_mediumWeight__ls_4M Text_body30__8ZCKS Text_headingColor__NboQZ\" data-testid=\"text\">Related articles<\/p><div class=\"InlineRelatedArticles_itemContainer__LwAeZ\"><p>\u00a0<\/p><div class=\"BlogGridItem_content__3WWgW\"><div class=\"BlogGridItem_contentTop___seSg\"><p class=\"Text_text__rSWMU BlogGridItem_categories__uXG7z Text_regularWeight__4Q_pV Text_body10__WUo8q Text_bodyColor__a5sZX\" data-testid=\"blog-post-category\">In Depth<\/p><p class=\"Text_text__rSWMU Text_mediumWeight__ls_4M Text_body40__LeIpz Text_headingColor__NboQZ\" data-testid=\"text\">NordLayer insights: the making of a Black Friday cyber scam<\/p><\/div><p class=\"Text_text__rSWMU BlogGridItem_contentBottom__1YBbt Text_body10__WUo8q Text_bodyColor__a5sZX\" data-testid=\"text\">14 Nov 2023<span class=\"BlogGridItem_timeReading__cHcZl\">8 min read<\/span><\/p><\/div><div class=\"BlogGridItem_imageContainer__a_Mw2\"><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 BlogGridItem_image__8jQZn\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/15k30LGMhyhaKPxwEgU4GQ\/a977691c9bf934c2bffa73a14dded83d\/PR-Blog_web_cover_1400x800.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"NordLayer insights: the making of a Black Friday cyber scam\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/div><p>\u00a0<\/p><div class=\"BlogGridItem_content__3WWgW\"><div class=\"BlogGridItem_contentTop___seSg\"><p class=\"Text_text__rSWMU BlogGridItem_categories__uXG7z Text_regularWeight__4Q_pV Text_body10__WUo8q Text_bodyColor__a5sZX\" data-testid=\"blog-post-category\">Partner Program<\/p><p class=\"Text_text__rSWMU Text_mediumWeight__ls_4M Text_body40__LeIpz Text_headingColor__NboQZ\" data-testid=\"text\">Capitalizing on threats &amp; opportunities \u2013 now is the time to venture into cybersecurity<\/p><\/div><p class=\"Text_text__rSWMU BlogGridItem_contentBottom__1YBbt Text_body10__WUo8q Text_bodyColor__a5sZX\" data-testid=\"text\">17 Aug 2023<span class=\"BlogGridItem_timeReading__cHcZl\">6 min read<\/span><\/p><\/div><div class=\"BlogGridItem_imageContainer__a_Mw2\"><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 BlogGridItem_image__8jQZn\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xaUgqkNJIyvvwhvc5SjLs\/8ba52f8bb2540fe78928d1b53abe8915\/Taking_advantage_of_threats_and_opportunities_web_cover_1400x800.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Taking advantage of threats and opportunities web cover 1400x800\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/div><p>\u00a0<\/p><\/div><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>How can businesses and law enforcement adapt to the evolving threat landscape on the dark web?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Understanding the tactics, techniques, and procedures (TTPs) of threat actors allows organizations to build more effective defenses. Monitoring threat actor movements helps in developing predictive security measures.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>There is also a kind of &#8220;Robin Hood&#8221; mentality among some ransomware groups. Can you elaborate on this?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> Interestingly, some ransomware groups adhere to a moral code, avoiding attacks on hospitals and focusing on other targets. This nuanced behavior among threat actors highlights the complex ethical landscape of the dark web.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/7wWNjYCOCzwfq4HOr0tFNN\/3f1cfdd94afa29d0d735b2424c6809e6\/4_1400x509.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Ransomware groups have been increasing their recruitment and budgets\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>Despite some groups avoiding healthcare targets, the sector remains highly vulnerable. Why is that?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>The healthcare sector often faces the highest ransom demands, with many hospitals lacking the security infrastructure to defend against sophisticated attacks. The sale of access credentials to healthcare institutions is alarmingly common.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>There\u2019s also a trend where threat actors are shifting from dark web forums to encrypted messaging platforms like Telegram. Why do you think threat actors are choosing these platforms?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>The shift to encrypted platforms like Telegram reflects threat actors&#8217; increasing paranoia and desire to evade detection. As law enforcement and security firms improve their monitoring capabilities, actors seek new ways to communicate securely.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/75xMiFAGyFn500rVXp95Cb\/a20ab2a0e9b92630c69cda5bc564fe8d\/5_1400x631.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Healthcare sector and ransomware\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>How do you conduct research on the deep web and platforms like Telegram?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Our team utilizes a combination of human intelligence and proprietary automated technologies to gather intelligence from various platforms. This allows us to monitor threat actor activities across the deep web and dark web comprehensively.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>What future research directions do you see for dark web intelligence?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo:<\/b> Collaborating with security practitioners and academic researchers can lead to innovative strategies for mitigating risks and combating cyber threats. Future research will likely focus on predictive analysis and the development of more sophisticated defense mechanisms.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/6SaE2PQIJUKTmB2TyKVZZx\/9d32e70f6344551cd54d725e4c3490bb\/6_1400x566.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Encrypted platforms need increase\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><h2 id=\"key-insight-5-for-businesses-to-stay-safe-they-need-all-employees-to-be-aware-of-possible-attacks\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #5: for businesses to stay safe, they need all employees to be aware of possible attacks<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>What general advice would you give businesses to enhance their security?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Businesses should prioritize early detection of threats by monitoring for reconnaissance activities. Leveraging threat intelligence to understand the landscape and adopting a proactive security posture can significantly reduce the risk of attacks.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer: <\/b>How important is cybersecurity awareness?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Cultivating a culture of security throughout an organization is crucial. Integrating cyber threat intelligence across all levels can inform strategic decisions and prioritize security measures, ultimately making it more difficult for threat actors to succeed.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3RUmk26HBq3OFGNjT6RYgI\/fa80dd41c89c7c177530e4796ede3963\/7_1400x509.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Proactive security costs less\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer:<\/b> In conclusion, investing in cybersecurity is more cost-effective than facing the consequences of a ransomware attack.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Mary D&#8217;Angelo: <\/b>Absolutely. The cost of proactive security measures is significantly lower than the potential losses from a successful cyber attack.<\/p><h2 id=\"how-nordlayer-can-help\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer can help<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer offers a comprehensive security approach, protecting your team with <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/network-security\/threat-prevention\/\">Threat Prevention<\/a> from harmful sites, securing online activities with <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/business-vpn\/\">VPN<\/a>, and ensuring appropriate access with <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/cloud-firewall\/\">Cloud Firewall<\/a>. Beyond these tools, we advocate for adopting <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/zero-trust\/network-access\/\">Zero Trust Network Access (ZTNA)<\/a>, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/sase\/security-service-edge\/\">Security Service Edge (SSE)<\/a>, and other cybersecurity frameworks to strengthen your defense. <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/contact-sales\/\">Our sales team<\/a> is always here if you need any help along the way.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Beyond NordLayer&#8217;s offerings, it&#8217;s essential to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/creating-a-culture-of-cybersecurity\/\">create a culture of cybersecurity<\/a>, maintain up-to-date software, and use secure communication tools. Additionally, assessing your vendors through a Third-Party Risk Management Plan and restricting their access can significantly mitigate risks.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Today is just like any other day at the office. You are [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-76070","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to use dark web monitoring: a talk with Mary D\u2019Angelo - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to use dark web monitoring: a talk with Mary D\u2019Angelo - Version 2\" \/>\n<meta property=\"og:description\" content=\"Today is just like any other day at the office. You are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-09T04:17:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How to use dark web monitoring: a talk with Mary D\u2019Angelo\",\"datePublished\":\"2024-03-09T04:17:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\\\/\"},\"wordCount\":2177,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/35el1E87WEXviuhaOqmsvi\\\/f17ad67021d848790e953cbcf8ea169e\\\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/\",\"name\":\"How to use dark web monitoring: a talk with Mary D\u2019Angelo - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/35el1E87WEXviuhaOqmsvi\\\/f17ad67021d848790e953cbcf8ea169e\\\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-03-09T04:17:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/35el1E87WEXviuhaOqmsvi\\\/f17ad67021d848790e953cbcf8ea169e\\\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/35el1E87WEXviuhaOqmsvi\\\/f17ad67021d848790e953cbcf8ea169e\\\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/dark-web-monitoring-for-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to use dark web monitoring: a talk with Mary D\u2019Angelo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to use dark web monitoring: a talk with Mary D\u2019Angelo - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/","og_locale":"zh_HK","og_type":"article","og_title":"How to use dark web monitoring: a talk with Mary D\u2019Angelo - Version 2","og_description":"Today is just like any other day at the office. You are [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/","og_site_name":"Version 2","article_published_time":"2024-03-09T04:17:09+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"12 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How to use dark web monitoring: a talk with Mary D\u2019Angelo","datePublished":"2024-03-09T04:17:09+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\/"},"wordCount":2177,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/how-to-use-dark-web-monitoring-a-talk-with-mary-dangelo\/","url":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/","name":"How to use dark web monitoring: a talk with Mary D\u2019Angelo - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-03-09T04:17:09+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/35el1E87WEXviuhaOqmsvi\/f17ad67021d848790e953cbcf8ea169e\/Dark_web_monitoring_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/dark-web-monitoring-for-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How to use dark web monitoring: a talk with Mary D\u2019Angelo"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jMW","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=76070"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76070\/revisions"}],"predecessor-version":[{"id":76077,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76070\/revisions\/76077"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=76070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=76070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=76070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}