<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, June 10th, 10am PDT

How to use social media monitoring to identify threats and act fast.

REGISTER NOW
SUBSCRIBE

Real-Time Crisis Monitoring - COVID 19

The Echosec Team May 27, 2020 General
The current global public health crisis has resulted in a massive increase in the amount of data being produced in the world, and therefore, the amount of data that Echosec Systems is processing.  Read More

How Is Machine Learning Used in Cybersecurity?

Alex Ciarniello May 26, 2020 Cyber Security, OSINT, machine learning
Machine learning has a wide range of applications across many industries—and cybersecurity is no exception. In fact, the market for artificial intelligence (AI) in cybersecurity is expected to reach USD $38.2 billion by 2026. Read More

OSINT Tools and Techniques for Business Risk Intelligence

Alex Ciarniello May 12, 2020 OSINT, Information Security, Corporate Security
Investing in business risk intelligence (BRI) has its challenges. Companies are often confronted with budget or staffing constraints when it comes to supporting a robust program—and proponents of upgrading a business risk intelligence strategy can be faced with convincing stakeholders of its value. Read More

5 Situations Where OSINT Tools are Critical for Retail Security

Alex Ciarniello May 05, 2020 OSINT, Retail Security
The term open-source intelligence (OSINT) has been used for decades, usually in the context of defence and intelligence communities. Online networks—from social media platforms to covert dark web forums—have become critical OSINT sources for locating security risks, investigating threats, and evaluating public sentiments. Read More

How to Detect Data Breaches Fast

Alex Ciarniello April 28, 2020 OSINT, Information Security, Data Breaches
Organizations face a 29.6% chance of experiencing a data breach in the next 2 years.  These are the odds that no one can afford to overlook, especially as cyber criminals are expanding their efforts to leverage real-world incidents, like the COVID-19 pandemic, as external attack vectors. Read More

Supply Chain Monitoring: the Value of Social Media Data in a Crisis

Alex Ciarniello April 16, 2020 Retail Security, Social Media Monitoring
One needs only to visit the cleaning supplies aisle of their local retailer in recent weeks to see the impacts of a global crisis on supply chains. Read More

Active Threat Response Strategies: How Informed Is Your Security Team?

Alex Ciarniello April 07, 2020 Event Monitoring, Retail Security, Corporate Security
How effective is your active threat response strategy? Read More

How to Choose an Intelligence Solution: In-House, Services, or Third-Party Platforms?

Alex Ciarniello March 31, 2020 Cyber Security, Corporate Security, Digital Investigation
Even the most security-savvy companies are still at risk for cyber attacks. Where does that leave organizations that lack cybersecurity resources and oversight? Read More

What is Raw Data and Why National Security Depends on it

Alex Ciarniello March 24, 2020 Cyber Security, Emergency Response, Event Monitoring
At the time of writing this article, the world is dealing head-on with the global COVID-19 pandemic. Governments are scrambling to keep up with the situation using real-world data and information. Cyber adversaries—some backed by nation-states—are also weaponizing the illness to target governments, citizens, and their data. Read More

Lifecycle of a Hack: The 5 Stages of a Data Breach

Alex Ciarniello March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More
1 2 3 4 5