How to Prevent Credential Stuffing as Attackers Scale Up
Days before the 2016 US election, a group of ethical hackers in the Netherlands scanned through...
[Security Magazine] Beyond standard risk feeds: Adopting a more holistic API solution
Echosec Systems recently had an article published in Security Magazine: Beyond standard risk feeds:...
Security on Auto-Pilot? How Threat Intelligence Tools Combat Alert Fatigue
In November 2013, analysts in a Bangalore security operations centre for Target received a number...
Why Digital Risk Protection Isn’t Just an IT Issue Anymore
Around 70% of companies are investing in digital transformation, even as the global economy takes a...
Boost Your API Coverage: Diversifying Threat Intelligence Feeds
Application programming interfaces (APIs) are becoming an integral part of any organization’s...
[Security Magazine] Artificial intelligence and national security: Integrating online data
Echosec Systems recently had an article published in Security Magazine: Artificial intelligence and...
Digital Risk Management: Why Integrating Corporate Teams Is Crucial
Some of the most damaging threats to any enterprise—from data leaks to PR disasters—can now be...
Sinking the Internet Iceberg: Why We Need to Redefine the Web
It’s a metaphor the threat intelligence and corporate security world has long been familiar with:...
Why Effective DRP Solutions Combine Social Media and Dark Web Data
If your organization has over 5,000 employees, it’s likely to experience one crisis per year on...