Explore the latest from Echosec Systems

Adapting to Social Media Threats: What Security Teams Need to Know

By the time you finish reading this sentence, well over 10 new users have entered the social media ‘verse. While...

Read More

Not Just for Marketers: Influencer Data for Intelligence Analysts

Influencers are usually associated with marketing products and services. But for public sector intelligence teams,...

Read More

Boost Your API Coverage: Diversifying Threat Intelligence Feeds

Application programming interfaces (APIs) are becoming an integral part of any organization’s investment in digital...

Read More

Sinking the Internet Iceberg: Why We Need to Redefine the Web

It’s a metaphor the threat intelligence and corporate security world has long been familiar with: the internet...

Read More

Why Effective DRP Solutions Combine Social Media and Dark Web Data

If your organization has over 5,000 employees, it’s likely to experience one crisis per year on average.

Read More

How Echosec Systems Supports Your Intelligence Cycle

The foundation of any intelligence-driven mission is built on the intelligence cycle—a six-step process used by...

Read More

How Is Machine Learning Used in Cybersecurity?

Machine learning has a wide range of applications across many industries—and cybersecurity is no exception. In fact,...

Read More

5 Situations Where OSINT Tools are Critical for Retail Security

The term open-source intelligence (OSINT) has been used for decades, usually in the context of defence and...

Read More

Financial Fraud: 7 Critical Dark Web Threats and How to Find Them Fast

Financial fraud has existed as long as financial institutions. The online world is rapidly changing how age-old...

Read More

Gift Card Fraud: A Guide for Retail Security Teams

Gift cards were the second most popular items purchased by Americans over the holidays last year according to the ...

Read More

Leave Comment


Most Popular