<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, Oct 28 - 10am PDT

What data sources are you overlooking? Security teams require web monitoring capabilities that locate risks across a wide variety of social media, deep and dark web sites. Learn more about how to combine these feeds for a comprehensive solution.

REGISTER NOW
SUBSCRIBE

What Is Gab and Why Should You Care?

Alex Ciarniello November 26, 2019 OSINT, Social Media Monitoring
Gab is also one of the latest data sources added to the Echosec social discovery platform. What is Gab and why is it such a crucial source of threat intelligence? Read More

Gift Card Fraud: A Guide for Retail Security Teams

Alex Ciarniello November 13, 2019 Retail Security, Dark Web
Gift cards were the second most popular items purchased by Americans over the holidays last year according to the National Retail Federation. Projected growth in gift card sales means that understanding fraud tactics is critical for loss prevention and brand protection over the next decade. Read More

4 Reasons Why Your Retail Security Team Needs to Be on the Dark Web

Alex Ciarniello November 05, 2019 Retail Security, Dark Web
“Your brand is what other people say about you when you’re not in the room.”—Jeff Bezos, Amazon Founder What if that room is the dark web? Read More

What Is Tor And The Deep Web?

The Echosec Team November 01, 2019 Asset Management, Cyber Security, OSINT, Brand Protection
*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019  The Deep Web is Where All the Criminals Hang Out, Right? Well, yes and no. To really understand what the deep web is, it helps to talk about what the Internet actually is. Read More

Police Investigations and Cyber Crime: How to Find Intelligence Safely

Alex Ciarniello October 29, 2019 Cyber Security, Dark Web, Digital Investigation
One of law enforcements’ largest barriers to cyber investigations is its inability to access online intelligence quickly and safely. This information can be critical to finding who committed the crime, whether it’s a drug bust or identity theft. Read More

10 Ways Your Data Security Is At Risk On The Dark Web

Alex Ciarniello October 15, 2019 Cyber Security, Dark Web
According to IBM’s CEO Ginni Rometty, cybercrime is the “greatest threat to every company in the world.” Data security is a top priority for organizations avoiding business disruption, reputation damage, and data and financial loss. In fact, the average total cost of a data breach was recently estimated at USD $3.92 million. Read More

Social Media Threat Intelligence: Are Facebook And Instagram Relevant?

Alex Ciarniello October 15, 2019 Social Media Monitoring
If you were to guess what the world’s most popular social media platforms are, a few big names probably come to mind: Facebook, Instagram, Twitter. However, there are plenty of other heavily active social media sites around the world that many of us have never heard about. Read More

4 Questions "The Great Hack" Left Unanswered

Alex Ciarniello October 03, 2019 Privacy, Information Security
In March 2018, The Observer and The New York Times revealed one of the most controversial stories of the internet age: data from millions of Facebook users had been used, without their consent, to inform political campaigns. Read More

What is Pastebin and Why Do Hackers Love It?

Alex Ciarniello September 24, 2019
Pastebin is a website that allows users to share plain text through public posts called “pastes.” The site currently has 17 million unique monthly users. Why is it so popular, and where did it come from? Read More

Why Cyber Investigations Are The New Focus For Law Enforcement

Alex Ciarniello September 05, 2019 Cyber Security
In 2016, GCN conducted a cybersecurity survey across local governments in the United States. More troubling than the rate of cyberattacks it found being committed was the fact that many local jurisdictions were unaware that they were being targeted, or did not keep track of cyberattacks at all.  Read More