<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, July 29, 10am PDT

Learn how to monitor less-understood extremist movements like the Boogaloo as the threat landscape evolves in response to events like COVID-19 and the 2020 presidential election.

REGISTER NOW
SUBSCRIBE

How Is Machine Learning Used in Cybersecurity?

Alex Ciarniello May 26, 2020 Cyber Security, OSINT, machine learning
Machine learning has a wide range of applications across many industries—and cybersecurity is no exception. In fact, the market for artificial intelligence (AI) in cybersecurity is expected to reach USD $38.2 billion by 2026. Read More

How to Choose an Intelligence Solution: In-House, Services, or Third-Party Platforms?

Alex Ciarniello March 31, 2020 Cyber Security, Corporate Security, Digital Investigation
Even the most security-savvy companies are still at risk for cyber attacks. Where does that leave organizations that lack cybersecurity resources and oversight? Read More

What is Raw Data and Why National Security Depends on it

Alex Ciarniello March 24, 2020 Cyber Security, Emergency Response, Event Monitoring
At the time of writing this article, the world is dealing head-on with the global COVID-19 pandemic. Governments are scrambling to keep up with the situation using real-world data and information. Cyber adversaries—some backed by nation-states—are also weaponizing the illness to target governments, citizens, and their data. Read More

Lifecycle of a Hack: The 5 Stages of a Data Breach

Alex Ciarniello March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More

What Is Tor And The Deep Web?

The Echosec Team November 01, 2019 Asset Management, Cyber Security, OSINT, Brand Protection
*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019  The Deep Web is Where All the Criminals Hang Out, Right? Well, yes and no. To really understand what the deep web is, it helps to talk about what the Internet actually is. Read More

Police Investigations and Cyber Crime: How to Find Intelligence Safely

Alex Ciarniello October 29, 2019 Cyber Security, Dark Web, Digital Investigation
One of law enforcements’ largest barriers to cyber investigations is its inability to access online intelligence quickly and safely. This information can be critical to finding who committed the crime, whether it’s a drug bust or identity theft. Read More

10 Ways Your Data Security Is At Risk On The Dark Web

Alex Ciarniello October 15, 2019 Cyber Security, Dark Web
According to IBM’s CEO Ginni Rometty, cybercrime is the “greatest threat to every company in the world.” Data security is a top priority for organizations avoiding business disruption, reputation damage, and data and financial loss. In fact, the average total cost of a data breach was recently estimated at USD $3.92 million. Read More

Why Cyber Investigations Are The New Focus For Law Enforcement

Alex Ciarniello September 05, 2019 Cyber Security
In 2016, GCN conducted a cybersecurity survey across local governments in the United States. More troubling than the rate of cyberattacks it found being committed was the fact that many local jurisdictions were unaware that they were being targeted, or did not keep track of cyberattacks at all.  Read More
1 2