ECHOSEC SYSTEMS
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report.
Read More
5 Current Cyber Attack Techniques and How to Stay Threat-Informed
Echosec Systems
February 13, 2020
Cyber Security,
Open Source Threat Intelligence,
Information Security
Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially.
Read More
Early in December 2019, Twitter CEO Jack Dorsey announced that the social platform is funding development of “an open and decentralized standard for social media.” Within the hour, Mastodon responded with a virtual eye-roll—it had been three years since it was specifically launched as a decentralized Twitter alternative.
Read More
More organizations are investing in services and software that aid in finding and analyzing online threat data relevant to their vertical. These programs alert security teams to vulnerabilities so they can mitigate or avoid online threats—such as breaches—and their staggering costs.
Read More
Why are executives increasingly targeted by cyber criminals, and how are data discovery tools mitigating and preventing executive security risks?
Read More
On January 1, 2020, the California Consumer Privacy Act (CCPA) came into effect and it's kind of a big deal—it’s the first data privacy law of its kind in the US, and applies to any organization using California-based data, regardless of where they are located.
Read More
Financial fraud has existed as long as financial institutions. The online world is rapidly changing how age-old financial crimes, from Ponzi schemes to identity theft, are approached—but it is also creating entirely new types of financial fraud.
Read More
Cyber Security Breach: What Happens in the Fallout?
Echosec Systems
December 11, 2019
Cyber Security,
Executive Protection,
Information Security,
Corporate Security
Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light.
Read More
Imagine picking up your phone to send a text message or check Twitter, only to discover that all of your phone’s services are inoperable. Confused, you open your laptop to check your emails for overdue phone bills—but your email password doesn’t work, either.
Read More
Gab is also one of the latest data sources added to the Echosec social discovery platform. What is Gab and why is it such a crucial source of threat intelligence?
Read More
Categories
- OSINT (41)
- Social Media Monitoring (28)
- Brand Protection (22)
- Cyber Security (21)
- Open Source Threat Intelligence (15)
- Corporate Security (13)
- Information Security (13)
- National Defense (11)
- Privacy (11)
- General (9)
- Dark Web (8)
- Geofencing (8)
- Asset Management (7)
- Digital Investigation (7)
- Executive Protection (7)
- Retail Security (7)
- Event Monitoring (6)
- machine learning (6)
- Emergency Response (5)
- Journalism (3)
- Data Breaches (2)
- threat intelligence feeds (1)