Authentic8 launches Silo Shield Program to Protect High-Risk Communities in Partnership with CISA

Authentic8, provider of the leading OSINT research platform Silo for Research, today launched their Silo Shield Program to enhance online security for high-risk communities.

Also today, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) launched a webpage listing free tools and services to strengthen defenses of high-risk communities, including Authentic8’s new Silo Shield Program.

These “high-risk” communities — non-governmental organizations, journalists, and academics — face digital risks that are existential threats to their missions, as they are targeted by some of the world’s most capable advanced persistent threats (APTs).

The new Silo Shield Program enables eligible persons to apply for access to Authentic8’s Silo for Research platform, which provides a secure solution to collect publicly available information.

Securely collecting web-based information is essential for these groups to carry out research, investigations, and advocacy.

“In an era where adversaries threaten those striving for social change and transparency, Authentic8 is proud to launch the Silo Shield Program.

This pioneering initiative offers robust online protection for high-risk communities at the forefront of pushing boundaries and challenging the status quo.

While we have supported similar organizations for years, recent work with CISA prompted us to formalize and expand access to those at risk,” says Ramesh Rajagopal, CEO and co-founder of Authentic8.

High-risk communities eligible to apply to the Silo Shield Program include:

  • Journalists focusing on topics like security, transparency and global affairs who perform online research and may be targeted by adversaries as a part of their work.
  • Activists and non-profit groups are eligible for Silo Shield as they work to safeguard human rights, prevent abuse and effect justice, as they rely on online research to uncover and document abuses, legal violations and advocacy opportunities.
  • Academics in fields like security, political science, sociology and environmental studies, whose research on global issues demands access to information across geographical boundaries — often in restrictive environments — are eligible.
  • Humanitarian aid organizations, including those focusing on direct support, anti-corruption efforts and digital freedom are eligible for Silo Shield, as their efforts to compile evidence, vet suppliers and aid recipients, and communicate safely online are critical to their missions.

“Our commitment to high-risk communities is more than just a promise; it’s a mission to arm them with the tools they need to conduct their vital work securely and confidently.

We are proud to enable their access to global online resources without fear of adversary surveillance or compromise,” says Matt Ashburn, a former CIA cyber officer and White House NSC Director who now serves as Authentic8’s vice president of Customer Success.

Through the Joint Cyber Defense Collaborative (JCDC), Authentic8 collaborated with CISA on their High-Risk Communities Protection effort to elevate awareness of the cyber threats that high-risk communities experience and resources available to mitigate them.

CISA’s High-Risk Communities webpage serves as a one-stop-shop for cybersecurity guidance and free or discounted tools and resources that are tailored to meet the needs of high-risk organizations that want to improve their cybersecurity baseline.

For more information on the Silo Shield program or the Silo for Research digital investigations platform, visit https://authentic8.com.

Contact
Head of Strategic Initiatives
Abel Vandegrift
Authentic8
abel@authentic8.com
Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and their…

2 hours ago

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…

14 hours ago

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…

18 hours ago

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…

19 hours ago

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…

19 hours ago

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…

21 hours ago