ECHOSEC SYSTEMS
Where Digital Meets Physical: Integrating Your Threat Intelligence Strategy
Echosec Systems
February 16, 2021
Cyber Security,
Open Source Threat Intelligence,
Digital Investigation
Threat intelligence. For public and private sector security professionals, the term is often synonymous with detecting and mitigating cyber attacks like malware and phishing.
Read More
Connecting the Dots | What Defense Analysts Need from OSINT Software
Echosec Systems
February 02, 2021
Open Source Threat Intelligence,
Digital Investigation,
National Defense
Open source intelligence (OSINT) is often described as a digital breadcrumb—a trail of clues left across the internet that help investigators understand adversaries.
Read More
Echosec Systems recently had an article published in Security Magazine: Beyond standard risk feeds: Adopting a more holistic API solution.
Read More
Security on Auto-Pilot? How Threat Intelligence Tools Combat Alert Fatigue
Echosec Systems
November 10, 2020
Cyber Security,
Information Security,
Corporate Security,
Digital Investigation
In November 2013, analysts in a Bangalore security operations centre for Target received a number of malware alarms. The alerts later reached Target security staff in Minneapolis and were promptly dismissed as false positives.
Read More
Echosec Systems recently had an article published in Security Magazine: Artificial intelligence and national security: Integrating online data
Read More
Some of the most damaging threats to any enterprise—from data leaks to PR disasters—can now be identified on the open, deep, and dark web. To address digital risks quickly and minimize hefty fiscal and reputational damages, organizations are turning to digital risk protection and management technologies to keep their digital footprint secure.
Read More
Even the most security-savvy companies are still at risk for cyber attacks. Where does that leave organizations that lack cybersecurity resources and oversight?
Read More
One of law enforcements’ largest barriers to cyber investigations is its inability to access online intelligence quickly and safely. This information can be critical to finding who committed the crime, whether it’s a drug bust or identity theft.
Read More
Categories
- OSINT (39)
- Cyber Security (23)
- Brand Protection (22)
- Social Media Monitoring (19)
- Corporate Security (13)
- Information Security (13)
- Open Source Threat Intelligence (12)
- Privacy (11)
- Dark Web (8)
- Digital Investigation (8)
- General (8)
- Geofencing (8)
- Asset Management (7)
- Executive Protection (7)
- Retail Security (7)
- Event Monitoring (5)
- National Defense (5)
- machine learning (5)
- Emergency Response (3)
- Journalism (3)
- Data Breaches (2)
- threat intelligence feeds (1)