ECHOSEC SYSTEMS BLOG

Explore the latest from Echosec Systems

How to Prevent Credential Stuffing as Attackers Scale Up

Days before the 2016 US election, a group of ethical hackers in the Netherlands scanned through logins from...

Read More

Case Study: Brand Protection for Cruise Operators During COVID-19

COVID-19 has meant severe financial impacts for many sectors due to travel restrictions, border shutdowns, and other...

Read More

5 Situations Where OSINT Tools are Critical for Retail Security

The term open-source intelligence (OSINT) has been used for decades, usually in the context of defence and...

Read More

Supply Chain Monitoring: the Value of Social Media Data in a Crisis

One needs only to visit the cleaning supplies aisle of their local retailer in recent weeks to see the impacts of a...

Read More

Active Threat Response Strategies: How Informed Is Your Security Team?

How effective is your active threat response strategy?

Read More

Protecting Executives with Online Data: Three Success Stories

Why are executives increasingly targeted by cyber criminals, and how are data discovery tools mitigating and...

Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020

Cyber security breaches often go undetected—until a service department hears a customer...

Read More

Gift Card Fraud: A Guide for Retail Security Teams

Gift cards were the second most popular items purchased by Americans over the holidays last year according to the ...

Read More

4 Reasons Why Your Retail Security Team Needs to Be on the Dark Web

“Your brand is what other people say about you when you’re not in the room.”—Jeff Bezos, Amazon Founder

What if...

Read More

What Is Tor And The Deep Web?

*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019 

The Deep Web is Where All the Criminals Hang Out,...

Read More

Leave Comment

SUBSCRIBE NOW

Most Popular