<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, July 29, 10am PDT

Learn how to monitor less-understood extremist movements like the Boogaloo as the threat landscape evolves in response to events like COVID-19 and the 2020 presidential election.

REGISTER NOW
SUBSCRIBE

How Echosec Systems Supports Your Intelligence Cycle

Alex Ciarniello June 30, 2020 OSINT, machine learning, National Defense
The foundation of any intelligence-driven mission is built on the intelligence cycle—a six-step process used by government and defense entities to turn raw information into actionable intelligence. Read More

Data Lakes and Niche Sources: Addressing National Defense Requirements

Alex Ciarniello June 16, 2020 OSINT, National Defense
Reliable data is the linchpin of effective decision making—particularly in matters of national security. Read More

How Is Machine Learning Used in Cybersecurity?

Alex Ciarniello May 26, 2020 Cyber Security, OSINT, machine learning
Machine learning has a wide range of applications across many industries—and cybersecurity is no exception. In fact, the market for artificial intelligence (AI) in cybersecurity is expected to reach USD $38.2 billion by 2026. Read More

OSINT Tools and Techniques for Business Risk Intelligence

Alex Ciarniello May 12, 2020 OSINT, Information Security, Corporate Security
Investing in business risk intelligence (BRI) has its challenges. Companies are often confronted with budget or staffing constraints when it comes to supporting a robust program—and proponents of upgrading a business risk intelligence strategy can be faced with convincing stakeholders of its value. Read More

5 Situations Where OSINT Tools are Critical for Retail Security

Alex Ciarniello May 05, 2020 OSINT, Retail Security
The term open-source intelligence (OSINT) has been used for decades, usually in the context of defence and intelligence communities. Online networks—from social media platforms to covert dark web forums—have become critical OSINT sources for locating security risks, investigating threats, and evaluating public sentiments. Read More

How to Detect Data Breaches Fast

Alex Ciarniello April 28, 2020 OSINT, Information Security, Data Breaches
Organizations face a 29.6% chance of experiencing a data breach in the next 2 years.  These are the odds that no one can afford to overlook, especially as cyber criminals are expanding their efforts to leverage real-world incidents, like the COVID-19 pandemic, as external attack vectors. Read More

Corporate Security: 10 Things Echosec Systems Can Do For Your Business

Alex Ciarniello January 21, 2020 OSINT, Corporate Security
  More organizations are investing in services and software that aid in finding and analyzing online threat data relevant to their vertical. These programs alert security teams to vulnerabilities so they can mitigate or avoid online threats—such as breaches—and their staggering costs. Read More

What Is Gab and Why Should You Care?

Alex Ciarniello November 26, 2019 OSINT, Social Media Monitoring
Gab is also one of the latest data sources added to the Echosec social discovery platform. What is Gab and why is it such a crucial source of threat intelligence? Read More

What Is Tor And The Deep Web?

The Echosec Team November 01, 2019 Asset Management, Cyber Security, OSINT, Brand Protection
*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019  The Deep Web is Where All the Criminals Hang Out, Right? Well, yes and no. To really understand what the deep web is, it helps to talk about what the Internet actually is. Read More

Social Media Threat Intelligence: Sources To Watch

Online public-facing content is growing exponentially. And, while most of this data is benign, some online hubs contain critical information for the safety and security of individuals and organizations. In order to develop an effective intelligence strategy, analysts and security teams must be pulling information from this vast quantity of data. The question is, which.. Read More
1 2 3 4