ECHOSEC SYSTEMS
Days before the 2016 US election, a group of ethical hackers in the Netherlands scanned through logins from LinkedIn’s 2012 breach. Then they took the password linked to Donald Trump’s account—yourefired—and were surprised when it worked against his Twitter login.
Read More
Security on Auto-Pilot? How Threat Intelligence Tools Combat Alert Fatigue
Echosec Systems
November 10, 2020
Cyber Security,
Information Security,
Corporate Security,
Digital Investigation
In November 2013, analysts in a Bangalore security operations centre for Target received a number of malware alarms. The alerts later reached Target security staff in Minneapolis and were promptly dismissed as false positives.
Read More
Around 70% of companies are investing in digital transformation, even as the global economy takes a turn in 2020. While the business advantages of digital transformation are widely understood, organizations are often much slower in understanding associated digital risks as business risks.
Read More
Letter From Echosec Systems' CTO, Michael Raypold: In 2014, Echosec Systems set out to make the world’s geo-based social media data available in an easy-to-use search engine. We soon extended this tool, Echosec, to include dark web data and data breaches in our threat intelligence focused add-on, Beacon.
Read More
Investing in business risk intelligence (BRI) has its challenges. Companies are often confronted with budget or staffing constraints when it comes to supporting a robust program—and proponents of upgrading a business risk intelligence strategy can be faced with convincing stakeholders of its value.
Read More
Organizations face a 29.6% chance of experiencing a data breach in the next 2 years. These are the odds that no one can afford to overlook, especially as cyber criminals are expanding their efforts to leverage real-world incidents, like the COVID-19 pandemic, as external attack vectors.
Read More
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report.
Read More
5 Current Cyber Attack Techniques and How to Stay Threat-Informed
Echosec Systems
February 13, 2020
Cyber Security,
Open Source Threat Intelligence,
Information Security
Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially.
Read More
On January 1, 2020, the California Consumer Privacy Act (CCPA) came into effect and it's kind of a big deal—it’s the first data privacy law of its kind in the US, and applies to any organization using California-based data, regardless of where they are located.
Read More
Cyber Security Breach: What Happens in the Fallout?
Echosec Systems
December 11, 2019
Cyber Security,
Executive Protection,
Information Security,
Corporate Security
Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light.
Read More
Categories
- OSINT (39)
- Cyber Security (23)
- Brand Protection (22)
- Social Media Monitoring (19)
- Open Source Threat Intelligence (15)
- Corporate Security (13)
- Information Security (13)
- Privacy (11)
- Dark Web (9)
- Digital Investigation (9)
- General (8)
- Geofencing (8)
- Asset Management (7)
- Executive Protection (7)
- National Defense (7)
- Retail Security (7)
- Event Monitoring (5)
- machine learning (5)
- Emergency Response (3)
- Journalism (3)
- Data Breaches (2)
- threat intelligence feeds (1)