The Blog
Engineering

The Billion-URL Diet: Cutting Python Loops From Our Pipeline
How we turned a Python-bound pipeline into a columnar, vectorized system built for scale.


Tirath Patel and William Gill
Latest Blog Posts
Research
Stopping Vishing Brand Impersonation Before It Reaches Your Customers
Learn how to detect and disrupt vishing brand impersonation, protect customers, and align security and fraud teams against phone-based scams.
Gina Jee
Research
External Phishing Threat Monitoring Explained
External phishing threat monitoring stops brand fraud at the source. Track lookalike domains and cloned sites before emails reach customers.
Gina Jee
Research
Online Brand Impersonation Reporting for Brands
Learn how to detect, report, and remove brand impersonation threats online with a structured strategy for brand protection professionals.
Gina Jee

Blog
The Billion-URL Diet: Cutting Python Loops From Our Pipeline

Blog
Stopping Vishing Brand Impersonation Before It Reaches Your Customers

Blog
External Phishing Threat Monitoring Explained

Blog
Online Brand Impersonation Reporting for Brands

Blog
Brand Phishing Trends + How to Respond Faster

Blog
Fake Domain Impersonation Removal: A Practical Guide

Blog
Doppel’s Customer Impersonation Simulations Reveal Risks

Blog
Rewiring Threat Intel: How Doppel’s Graph Engine Maps Social Engineering at Scale
Blog