x

CRISIS AVERTED—Protecting Your Enterprise

How software usability, speed to information, and breadth of data helps address key challenges faced by corporate security teams. Watch the 3-part video series.

WATCH NOW

Social Media Threat Intelligence: Sources To Watch

Echosec Systems August 7, 2019 Social Media Monitoring, OSINT & Tools

Online public-facing content is growing exponentially. And, while most of this data is benign, some online hubs contain critical information for the safety and security of individuals and organizations. In order to develop an effective intelligence strategy, analysts and security teams must be pulling information from this vast quantity of data. The question is, which social media networks should you be monitoring? New call-to-action

For organizations to protect themselves against internal and external threats, speed-to-information is key. The most effective security strategies involve gathering, filtering, and analyzing data faster.

arial view blur peopleOpen source intelligence (OSINT) refers to information discovery via public data sources for a specific purpose. Security professionals use OSINT to help protect assets, prevent loss, expose fraud, detect data breaches and criminal activity, and ensure the safety of their team and customers. 

OSINT tools and techniques for threat intelligence and risk management   <https://cta-redirect.hubspot.com/cta/redirect/3409664/c6a8c877-6e17-4ac6-9f15-7a5a694128ce>

So, where should you look for open source intelligence? With so many networks to cover, data aggregation platforms like Echosec have become essential tools for data discovery and threat intelligence. Basically any place where people go to connect and communicate is a place for potentially malignant behaviour. In this post, we’re outlining the networks that should definitely be on your data sources checklist, and why.

Note: this is just a sampling of the sources Echosec Systems has access to. For a complete list of sources, contact us

Micro-Blogging, Photo, and Video-Sharing Networks

Most networking platforms are simple to use and accessible to anyone with an email address. They are rich data sources for OSINT discovery, utilized by artists, businesses, content creators, and people just wanting to connect and socialize.

Photo and Video-Sharing Networks

smartphone photo crowd blur streetSourcing photo and video content can help security professionals gain situational awareness through the eyes of users on the ground during events, at certain locations, or during disasters.

Social media monitoring and how to gather intelligence from open source data   <https://cta-redirect.hubspot.com/cta/redirect/3409664/be8d8030-7477-4091-84b2-1570416bf170>

Message Boards and Online Discussion Forums

Message boards and online discussion forums are used by people wanting to connect, learn or discuss topics. Within these platforms, there is ample opportunity for destructive behaviour and criminal collaboration, planning, and strategizing. Security and safety teams have been able to predict events or activities before they occur by monitoring online discussions.

Social Journalism and News Aggregation Platforms

laptop hands deskWhen developing an effective and well-rounded security protocol, it’s important to keep tabs on what’s happening in the world. Aggregating news sources can help you gain perspective when predicting and analyzing behaviour as well as getting alerts and gathering information on specific locations, current events, trends, and communities

New call-to-action

Where you look for information depends on what you want to find. Performing a basic surface web search through a platform like Google will return a relatively broad list of hits. There is an enormous amount of publicly available data out there. In order for any of it to be useful for threat intelligence, it must be aggregated and filtered quickly and directly from the sources themselves. 

Discover how Echosec can find, filter, and deliver open source intelligence for you and your team.

REQUEST A CONSULT

 

DEEP DIVE RESOURCES

 

 

SOCIAL MEDIA MONITORING

READ NOW

 

 

WHAT IS THREAT INTELLIGENCE?

READ NOW

 

 

DARK WEB MONITORING

READ NOW

 

 

DATA BREACHES

READ NOW

 

 

WHAT IS OSINT & HOW TO USE IT

READ NOW

 

 

DIGITAL RISK

READ NOW