<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
SUBSCRIBE

Why Effective DRP Solutions Combine Social Media and Dark Web Data

Alex Ciarniello September 01, 2020 Asset Management, Cyber Security, Brand Protection, Corporate Security
If your organization has over 5,000 employees, it’s likely to experience one crisis per year on average. Read More

How Is Machine Learning Used in Cybersecurity?

Alex Ciarniello May 26, 2020 Cyber Security, OSINT, machine learning
Machine learning has a wide range of applications across many industries—and cybersecurity is no exception. In fact, the market for artificial intelligence (AI) in cybersecurity is expected to reach USD $38.2 billion by 2026. Read More

How to Choose an Intelligence Solution: In-House, Services, or Third-Party Platforms?

Alex Ciarniello March 31, 2020 Cyber Security, Corporate Security, Digital Investigation
Even the most security-savvy companies are still at risk for cyber attacks. Where does that leave organizations that lack cybersecurity resources and oversight? Read More

What is Raw Data and Why National Security Depends on it

Alex Ciarniello March 24, 2020 Cyber Security, Emergency Response, Event Monitoring
At the time of writing this article, the world is dealing head-on with the global COVID-19 pandemic. Governments are scrambling to keep up with the situation using real-world data and information. Cyber adversaries—some backed by nation-states—are also weaponizing the illness to target governments, citizens, and their data. Read More

Lifecycle of a Hack: The 5 Stages of a Data Breach

Alex Ciarniello March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More

What Is Tor And The Deep Web?

The Echosec Team November 01, 2019 Asset Management, Cyber Security, OSINT, Brand Protection
*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019  The Deep Web is Where All the Criminals Hang Out, Right? Well, yes and no. To really understand what the deep web is, it helps to talk about what the Internet actually is. Read More

Police Investigations and Cyber Crime: How to Find Intelligence Safely

Alex Ciarniello October 29, 2019 Cyber Security, Dark Web, Digital Investigation
One of law enforcements’ largest barriers to cyber investigations is its inability to access online intelligence quickly and safely. This information can be critical to finding who committed the crime, whether it’s a drug bust or identity theft. Read More

10 Ways Your Data Security Is At Risk On The Dark Web

Alex Ciarniello October 15, 2019 Cyber Security, Dark Web
According to IBM’s CEO Ginni Rometty, cybercrime is the “greatest threat to every company in the world.” Data security is a top priority for organizations avoiding business disruption, reputation damage, and data and financial loss. In fact, the average total cost of a data breach was recently estimated at USD $3.92 million. Read More
1 2