Skip to content

Echosec Systems Blog

SUBSCRIBE

Adapting to Social Media Threats: What Security Teams Need to Know

By the time you finish reading this sentence, well over 10 new users have entered the social media...

Not Just for Marketers: Influencer Data for Intelligence Analysts

Influencers are usually associated with marketing products and services. But for public sector...

Boost Your API Coverage: Diversifying Threat Intelligence Feeds

Application programming interfaces (APIs) are becoming an integral part of any organization’s...

Sinking the Internet Iceberg: Why We Need to Redefine the Web

It’s a metaphor the threat intelligence and corporate security world has long been familiar with:...

Why Effective DRP Solutions Combine Social Media and Dark Web Data

If your organization has over 5,000 employees, it’s likely to experience one crisis per year on...

How Echosec Systems Supports Your Intelligence Cycle

The foundation of any intelligence-driven mission is built on the intelligence cycle—a six-step...

How Is Machine Learning Used in Cybersecurity?

Machine learning has a wide range of applications across many industries—and cybersecurity is no...

5 Cases for OSINT Tools and Social Media for Security

The term open-source intelligence (OSINT) has been used for decades, usually in the context of...

Data Breach Detection 101

Data breaches are an inevitable crisis for any organization with a digital footprint. Data breach...

Financial Fraud: 7 Critical Dark Web Threats and How to Find Them Fast

Financial fraud has existed as long as financial institutions. The online world is rapidly changing...

1 2