ECHOSEC SYSTEMS
Where Digital Meets Physical: Integrating Your Threat Intelligence Strategy
Echosec Systems
February 16, 2021
Cyber Security,
Open Source Threat Intelligence,
Digital Investigation
Threat intelligence. For public and private sector security professionals, the term is often synonymous with detecting and mitigating cyber attacks like malware and phishing.
Read More
Connecting the Dots | What Defense Analysts Need from OSINT Software
Echosec Systems
February 02, 2021
Open Source Threat Intelligence,
Digital Investigation,
National Defense
Open source intelligence (OSINT) is often described as a digital breadcrumb—a trail of clues left across the internet that help investigators understand adversaries.
Read More
For the average software application, an intuitive UX usually means fewer headaches for the end-user. But when it comes to software for defense teams, usability can make the difference between secured assets and loss of data, infrastructure, and human life.
Read More
Boost Your API Coverage: Diversifying Threat Intelligence Feeds
Echosec Systems
October 27, 2020
Cyber Security,
Open Source Threat Intelligence,
threat intelligence feeds
Application programming interfaces (APIs) are becoming an integral part of any organization’s investment in digital transformation—and intelligence and corporate security entities are no exception.
Read More
5 Current Cyber Attack Techniques and How to Stay Threat-Informed
Echosec Systems
February 13, 2020
Cyber Security,
Open Source Threat Intelligence,
Information Security
Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially.
Read More
Why are executives increasingly targeted by cyber criminals, and how are data discovery tools mitigating and preventing executive security risks?
Read More
Online public-facing content is growing exponentially. And, while most of this data is benign, some online hubs contain critical information for the safety and security of individuals and organizations. In order to develop an effective intelligence strategy, analysts and security teams must be pulling information from this vast quantity of data. The question is, which..
Read More
Travel Risk Management: Protect Your Team With Social Media Intelligence
Echosec Systems
July 23, 2019
Executive Protection,
Open Source Threat Intelligence,
Social Media Monitoring
The ability to hold face-to-face meetings online has not reduced the need for corporate travel. More than ever, organizations are sending their personnel on business trips internationally. Travel risk management is a growing industry that proactively mitigates security threats for business travellers.
Read More
Three years ago, an eternity in the information security space, two chief information security officers spoke on a topic at RSA Conference 2016 in San Francisco that has kept many a CISO awake at night: how best to build an integrated corporate security technology stack.
Read More
It is estimated that 90% of the world’s data has been created in the last two years alone. What that means for businesses is that they may be significantly more vulnerable to information breaches than ever before.
Read More
Categories
- OSINT (39)
- Cyber Security (23)
- Brand Protection (22)
- Social Media Monitoring (19)
- Corporate Security (13)
- Information Security (13)
- Open Source Threat Intelligence (12)
- Privacy (11)
- Dark Web (8)
- Digital Investigation (8)
- General (8)
- Geofencing (8)
- Asset Management (7)
- Executive Protection (7)
- Retail Security (7)
- Event Monitoring (5)
- National Defense (5)
- machine learning (5)
- Emergency Response (3)
- Journalism (3)
- Data Breaches (2)
- threat intelligence feeds (1)