Skip to content

Echosec Systems Blog

SUBSCRIBE

How Does the Public Sector Gather Open Source Intelligence (OSINT)?

Public sector intelligence teams are responsible for helping inform decisions for a range of...

Boolean Rules Simplified: A Guide for Security & Intelligence Analysts

You’re an intelligence analyst and your team has just received an alert for a potential security...

5 Ways Governments Can Apply Open Source Intelligence

In the face of national security threats, governments need to stay prepared and make prompt,...

Cybersecurity to Passport Fraud: How OSINT Supports Airport Security

Open-source data—from social media to the dark web—gives airport security personnel the...

Where Digital Meets Physical: Integrating Your Threat Intelligence Strategy

Threat intelligence. For public and private sector security professionals, the term is often...

Connecting the Dots | What Public Sector Analysts Need from OSINT Software

Open source intelligence (OSINT) is often described as a digital breadcrumb—a trail of clues...

Threat Intelligence Tools and the Importance of Usability

For the average software application, an intuitive UX usually means fewer headaches for the...

How to Prevent Credential Stuffing as Attackers Scale Up

Days before the 2016 US election, a group of ethical hackers in the Netherlands scanned through...

[Security Magazine] Beyond standard risk feeds: Adopting a more holistic API solution

Echosec Systems recently had an article published in Security Magazine: Beyond standard risk...

Security on Auto-Pilot? How Threat Intelligence Tools Combat Alert Fatigue

In November 2013, analysts in a Bangalore security operations centre for Target received a...