x

DOWN TO THE WIRE

When seconds matter in the public sector. See how software usability, speed to information, and breadth of data helps address key challenges faced by intelligence teams in this 3-part video series.

WATCH NOW

How to Prevent Credential Stuffing as Attackers Scale Up

Echosec Systems November 17, 2020 Executive Protection, Information Security, Data Breaches
Days before the 2016 US election, a group of ethical hackers in the Netherlands scanned through logins from LinkedIn’s 2012 breach. Then they took the password linked to Donald Trump’s account—yourefired—and were surprised when it worked against his Twitter login. Read More

Security on Auto-Pilot? How Threat Intelligence Tools Combat Alert Fatigue

In November 2013, analysts in a Bangalore security operations centre for Target received a number of malware alarms. The alerts later reached Target security staff in Minneapolis and were promptly dismissed as false positives. Read More

Why Digital Risk Protection Isn’t Just an IT Issue Anymore

Echosec Systems November 03, 2020 Cyber Security, Information Security, Corporate Security
Around 70% of companies are investing in digital transformation, even as the global economy takes a turn in 2020. While the business advantages of digital transformation are widely understood, organizations are often much slower in understanding associated digital risks as business risks. Read More

Feature Release: Digital Asset Security

Echosec Systems August 11, 2020 Asset Management, Information Security, machine learning
Letter From Echosec Systems' CTO, Michael Raypold: In 2014, Echosec Systems set out to make the world’s geo-based social media data available in an easy-to-use search engine. We soon extended this tool, Echosec, to include dark web data and data breaches in our threat intelligence focused add-on, Beacon. Read More

OSINT Tools and Techniques for Business Risk Intelligence

Echosec Systems May 12, 2020 OSINT, Information Security, Corporate Security
Investing in business risk intelligence (BRI) has its challenges. Companies are often confronted with budget or staffing constraints when it comes to supporting a robust program—and proponents of upgrading a business risk intelligence strategy can be faced with convincing stakeholders of its value. Read More

How to Detect Data Breaches Fast

Echosec Systems April 28, 2020 OSINT, Information Security, Data Breaches
Organizations face a 29.6% chance of experiencing a data breach in the next 2 years.  These are the odds that no one can afford to overlook, especially as cyber criminals are expanding their efforts to leverage real-world incidents, like the COVID-19 pandemic, as external attack vectors. Read More

Lifecycle of a Hack: The 5 Stages of a Data Breach

Echosec Systems March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

How Data Compliance Protects Your Organization (and the Public)

Echosec Systems January 09, 2020 Privacy, Information Security
On January 1, 2020, the California Consumer Privacy Act (CCPA) came into effect and it's kind of a big deal—it’s the first data privacy law of its kind in the US, and applies to any organization using California-based data, regardless of where they are located. Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More
1 2