Skip to content

Echosec Systems Blog

SUBSCRIBE

Analyzing Social Data From Around The World

Because social media is more accessible than ever before, some countries and regions access...

How Does Social Data Support Critical Event Management?

If a disaster struck your business right now, could you still effectively protect assets and...

5 Travel Risks Executive Protection Teams Must Consider in 2021

Throughout June, over double the number of travelers passed through TSA checkpoints than in...

The Age of Alt-Tech: 4 Fringe Social Media Threats to Watch

In January 2021, fringe social networks were making headlines. The United States Capitol had...

Adapting to Social Media Threats: What Security Teams Need to Know

By the time you finish reading this sentence, well over 10 new users have entered the social...

How SOC 2 Compliant Security Software Mitigates Third-Party Risk

In your quest for a threat intelligence service or software provider, prospects may claim to...

5 Reasons Why Security Convergence Is Critical in 2021

In February 2021, a water treatment plant worker in Oldsmar, Florida noticed some rogue mouse...

Broad Monitoring vs. Targeted Threats: Choose the Right OSINT Tools

What’s the difference between broad threat monitoring and targeted threat detection, and how can...

Security Technology: Improving Risk Assessments for Service Providers

As security strategies become more complex and digitized, it makes sense for large organizations...

Not Just for Marketers: Influencer Data for Intelligence Analysts

Influencers are usually associated with marketing products and services. But for public sector...