Skip to content

Echosec Systems Blog

SUBSCRIBE

Connecting the Dots | What Public Sector Analysts Need from OSINT Software

Open source intelligence (OSINT) is often described as a digital breadcrumb—a trail of clues...

Threat Intelligence Tools and the Importance of Usability

For the average software application, an intuitive UX usually means fewer headaches for the...

[Security Magazine] Beyond standard risk feeds: Adopting a more holistic API solution

Echosec Systems recently had an article published in Security Magazine: Beyond standard risk...

Security on Auto-Pilot? How Threat Intelligence Tools Combat Alert Fatigue

In November 2013, analysts in a Bangalore security operations centre for Target received a...

Boost Your API Coverage: Diversifying Threat Intelligence Feeds

Application programming interfaces (APIs) are becoming an integral part of any organization’s...

Why Effective DRP Solutions Combine Social Media and Dark Web Data

If your organization has over 5,000 employees, it’s likely to experience one crisis per year on...

Feature Release: Digital Asset Security

Letter From Echosec Systems' CTO, Michael Raypold:

In 2014, Echosec Systems set out to make the...

How Echosec Systems Supports Your Intelligence Cycle

The foundation of any intelligence-driven mission is built on the intelligence cycle—a six-step...

How Is Machine Learning Used in Cybersecurity?

Machine learning has a wide range of applications across many industries—and cybersecurity is no...

1 2 3 4 5

Our goal with this blog is to provide you with our unique perspective on topics related to open-source intelligence, security trends, and breaking news. Because our solutions are widely used by security and intelligence analysts, we use this space to share lots of helpful search tips, OSINT techniques, and industry insights. If you have a suggestion on a topic you'd like us to write about, please send an email to marketing@echosec.net