x

Wednesday, Jan. 27, 10am PDT

Are finished intelligence solutions always best? When your analysts need raw data...

SIGN UP

Lifecycle of a Hack: The 5 Stages of a Data Breach

Echosec Systems March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

What is Mastodon and Why Should You Care?

Echosec Systems February 04, 2020 Open Source Threat Intelligence, Social Media Monitoring
Early in December 2019, Twitter CEO Jack Dorsey announced that the social platform is funding development of “an open and decentralized standard for social media.” Within the hour, Mastodon responded with a virtual eye-roll—it had been three years since it was specifically launched as a decentralized Twitter alternative. Read More

Corporate Security: 10 Things Echosec Systems Can Do For Your Business

Echosec Systems January 21, 2020 OSINT, Corporate Security
  More organizations are investing in services and software that aid in finding and analyzing online threat data relevant to their vertical. These programs alert security teams to vulnerabilities so they can mitigate or avoid online threats—such as breaches—and their staggering costs. Read More

Protecting Executives with Online Data: Three Success Stories

Echosec Systems January 14, 2020 Executive Protection, Open Source Threat Intelligence
Why are executives increasingly targeted by cyber criminals, and how are data discovery tools mitigating and preventing executive security risks? Read More

How Provider Compliance Protects Your Organization (and the Public)

Echosec Systems January 09, 2020 Privacy, Information Security
On January 1, 2020, the California Consumer Privacy Act (CCPA) came into effect and it's kind of a big deal—it’s the first data privacy law of its kind in the US, and applies to any organization using California-based data, regardless of where they are located. Read More

Financial Fraud: 7 Critical Dark Web Threats and How to Find Them Fast

Echosec Systems January 07, 2020 Dark Web, Corporate Security
Financial fraud has existed as long as financial institutions. The online world is rapidly changing how age-old financial crimes, from Ponzi schemes to identity theft,  are approached—but it is also creating entirely new types of financial fraud. Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More

How to Protect VIPs Against the Tragic Consequences of SIM Jacking

Echosec Systems December 03, 2019 Privacy, Information Security, Corporate Security
Imagine picking up your phone to send a text message or check Twitter, only to discover that all of your phone’s services are inoperable. Confused, you open your laptop to check your emails for overdue phone bills—but your email password doesn’t work, either. Read More

What Is Gab and Why Should You Care?

Echosec Systems November 26, 2019 OSINT, Social Media Monitoring
Gab is also one of the latest data sources added to the Echosec social discovery platform. What is Gab and why is it such a crucial source of threat intelligence? Read More