ECHOSEC SYSTEMS BLOG

Explore the latest from Echosec Systems

Adapting to Social Media Threats: What Security Teams Need to Know

By the time you finish reading this sentence, well over 10 new users have entered the social media ‘verse. While...

Read More

How SOC 2 Compliant Security Software Mitigates Third-Party Risk

In your quest for a threat intelligence service or software provider, prospects may claim to manage your...

Read More

5 Reasons Why Security Convergence Is Critical in 2021

In February 2021, a water treatment plant worker in Oldsmar, Florida noticed some rogue mouse clicks on his monitor,...

Read More

Broad Monitoring vs. Targeted Threats: Choose the Right OSINT Tools

What’s the difference between broad threat monitoring and targeted threat detection, and how can you choose tools...

Read More

Security Technology: Improving Risk Assessments for Service Providers

As security strategies become more complex and digitized, it makes sense for large organizations to hire a third...

Read More

Not Just for Marketers: Influencer Data for Intelligence Analysts

Influencers are usually associated with marketing products and services. But for public sector intelligence teams,...

Read More

How Does the Public Sector Gather Open Source Intelligence (OSINT)?

Public sector intelligence teams are responsible for helping inform decisions for a range of national security...

Read More

Boolean Rules Simplified: A Guide for Security & Intelligence Analysts

You’re an intelligence analyst and your team has just received an alert for a potential security breach. You need...

Read More

5 Ways Governments Can Apply Open Source Intelligence

In the face of national security threats, governments need to stay prepared and make prompt, appropriate decisions...

Read More

Cybersecurity to Passport Fraud: How OSINT Supports Airport Security

Open-source data—from social media to the dark web—gives airport security personnel the information they need to...

Read More

Leave Comment

SUBSCRIBE NOW

Most Popular