<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, Sept 16th 10am PDT

Intelligent monitoring of your digital footprint is now within reach. Join us for our live feature release demo to see how you can easily protect your enterprise with persistent monitoring of deep and dark websites, social media, paste sites, and data breaches.

SAVE MY SEAT
SUBSCRIBE

Feature Release: Asset Monitoring

The Echosec Team August 11, 2020 Asset Management, Information Security, machine learning
Letter From Echosec Systems' CTO, Michael Raypold: In 2014, Echosec Systems set out to make the world’s geo-based social media data available in an easy-to-use search engine. We soon extended this tool, Echosec, to include dark web data and data breaches in our threat intelligence focused add-on, Beacon. Read More

OSINT Tools and Techniques for Business Risk Intelligence

Alex Ciarniello May 12, 2020 OSINT, Information Security, Corporate Security
Investing in business risk intelligence (BRI) has its challenges. Companies are often confronted with budget or staffing constraints when it comes to supporting a robust program—and proponents of upgrading a business risk intelligence strategy can be faced with convincing stakeholders of its value. Read More

How to Detect Data Breaches Fast

Alex Ciarniello April 28, 2020 OSINT, Information Security, Data Breaches
Organizations face a 29.6% chance of experiencing a data breach in the next 2 years.  These are the odds that no one can afford to overlook, especially as cyber criminals are expanding their efforts to leverage real-world incidents, like the COVID-19 pandemic, as external attack vectors. Read More

Lifecycle of a Hack: The 5 Stages of a Data Breach

Alex Ciarniello March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

How Provider Compliance Protects Your Organization (and the Public)

Alex Ciarniello January 09, 2020 Privacy, Information Security
On January 1, 2020, the California Consumer Privacy Act (CCPA) came into effect and it's kind of a big deal—it’s the first data privacy law of its kind in the US, and applies to any organization using California-based data, regardless of where they are located. Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More

How to Protect VIPs Against the Tragic Consequences of SIM Jacking

Alex Ciarniello December 03, 2019 Privacy, Information Security, Corporate Security
Imagine picking up your phone to send a text message or check Twitter, only to discover that all of your phone’s services are inoperable. Confused, you open your laptop to check your emails for overdue phone bills—but your email password doesn’t work, either. Read More

4 Questions "The Great Hack" Left Unanswered

Alex Ciarniello October 03, 2019 Privacy, Information Security
In March 2018, The Observer and The New York Times revealed one of the most controversial stories of the internet age: data from millions of Facebook users had been used, without their consent, to inform political campaigns. Read More

5 Ways To Protect Your Intellectual Property On Social Media

  Our thanks to Stephanie Meadows for letting us re-post her article on 5 ways to protect your intellectual property on Social Media. It was originally published on LinkedIn Read More
1