<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, July 29, 10am PDT

Learn how to monitor less-understood extremist movements like the Boogaloo as the threat landscape evolves in response to events like COVID-19 and the 2020 presidential election.

REGISTER NOW
SUBSCRIBE

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More

How to Protect VIPs Against the Tragic Consequences of SIM Jacking

Alex Ciarniello December 03, 2019 Privacy, Information Security, Corporate Security
Imagine picking up your phone to send a text message or check Twitter, only to discover that all of your phone’s services are inoperable. Confused, you open your laptop to check your emails for overdue phone bills—but your email password doesn’t work, either. Read More

What Is Gab and Why Should You Care?

Alex Ciarniello November 26, 2019 OSINT, Social Media Monitoring
Gab is also one of the latest data sources added to the Echosec social discovery platform. What is Gab and why is it such a crucial source of threat intelligence? Read More

Gift Card Fraud: A Guide for Retail Security Teams

Alex Ciarniello November 13, 2019 Retail Security, Dark Web
Gift cards were the second most popular items purchased by Americans over the holidays last year according to the National Retail Federation. Projected growth in gift card sales means that understanding fraud tactics is critical for loss prevention and brand protection over the next decade. Read More

4 Reasons Why Your Retail Security Team Needs to Be on the Dark Web

Alex Ciarniello November 05, 2019 Retail Security, Dark Web
“Your brand is what other people say about you when you’re not in the room.”—Jeff Bezos, Amazon Founder What if that room is the dark web? Read More

What Is Tor And The Deep Web?

The Echosec Team November 01, 2019 Asset Management, Cyber Security, OSINT, Brand Protection
*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019  The Deep Web is Where All the Criminals Hang Out, Right? Well, yes and no. To really understand what the deep web is, it helps to talk about what the Internet actually is. Read More

Police Investigations and Cyber Crime: How to Find Intelligence Safely

Alex Ciarniello October 29, 2019 Cyber Security, Dark Web, Digital Investigation
One of law enforcements’ largest barriers to cyber investigations is its inability to access online intelligence quickly and safely. This information can be critical to finding who committed the crime, whether it’s a drug bust or identity theft. Read More

10 Ways Your Data Security Is At Risk On The Dark Web

Alex Ciarniello October 15, 2019 Cyber Security, Dark Web
According to IBM’s CEO Ginni Rometty, cybercrime is the “greatest threat to every company in the world.” Data security is a top priority for organizations avoiding business disruption, reputation damage, and data and financial loss. In fact, the average total cost of a data breach was recently estimated at USD $3.92 million. Read More

Social Media Threat Intelligence: Are Facebook And Instagram Relevant?

Alex Ciarniello October 15, 2019 Social Media Monitoring
If you were to guess what the world’s most popular social media platforms are, a few big names probably come to mind: Facebook, Instagram, Twitter. However, there are plenty of other heavily active social media sites around the world that many of us have never heard about. Read More

4 Questions "The Great Hack" Left Unanswered

Alex Ciarniello October 03, 2019 Privacy, Information Security
In March 2018, The Observer and The New York Times revealed one of the most controversial stories of the internet age: data from millions of Facebook users had been used, without their consent, to inform political campaigns. Read More
1 2 3 4 5