Skip to content

Echosec Systems Blog

SUBSCRIBE

Adapting to Social Media Threats: What Security Teams Need to Know

By the time you finish reading this sentence, well over 10 new users have entered the social...

Not Just for Marketers: Influencer Data for Intelligence Analysts

Influencers are usually associated with marketing products and services. But for public sector...

Boost Your API Coverage: Diversifying Threat Intelligence Feeds

Application programming interfaces (APIs) are becoming an integral part of any organization’s...

Sinking the Internet Iceberg: Why We Need to Redefine the Web

It’s a metaphor the threat intelligence and corporate security world has long been familiar...

Why Effective DRP Solutions Combine Social Media and Dark Web Data

If your organization has over 5,000 employees, it’s likely to experience one crisis per year on...

How Echosec Systems Supports Your Intelligence Cycle

The foundation of any intelligence-driven mission is built on the intelligence cycle—a six-step...

How Is Machine Learning Used in Cybersecurity?

Machine learning has a wide range of applications across many industries—and cybersecurity is no...

5 Situations Where OSINT Tools are Critical for Retail Security

The term open-source intelligence (OSINT) has been used for decades, usually in the context of...

Financial Fraud: 7 Critical Dark Web Threats and How to Find Them Fast

Financial fraud has existed as long as financial institutions. The online world is rapidly...

Gift Card Fraud: A Guide for Retail Security Teams

Gift cards were the second most popular items purchased by Americans over the holidays last year...

1 2