Cybersecurity Services
Overview
vCISO-Led Security Team as a Service (STaaS)
Offensive Security + Adversary Simulation
Defensive Security Services + Hardening
Risk Advisory + GRC
Industries
Overview
Financial Services
Higher Education
Healthcare
Technology and SaaS
Sports and Entertainment
Manufacturing
Professional Services
Retail
Not for Profit
Defense Industrial Base (DIB)
Partners
About
Careers
Intelligence
Resources
Press
Cybersecurity Services
vCISO-Led Security Team as a Service (STaaS)
Offensive Security + Adversary Simulation
Defensive Security Services + Hardening
Risk Advisory + GRC
Industries
Financial Services
Higher Education
Healthcare
Technology and SaaS
Sports and Entertainment
Manufacturing
Professional Services
Retail
Not for Profit
Defense Industrial Base (DIB)
Partners
About
Careers
Intelligence
Press and Events
Contact
Latest Intelligence
GDPR Compliance Audit: 5 Critical Areas You Can't Overlook
GDPR compliance, GDPR compliance checklist, GDPR audit preparation, Data privacy regulations, GDPR audit mistakes, GDPR compliance services, Data protection best practices, How to prepare for a GDPR audit, GDPR data mapping guide, Records of processing activities, GDPR security measures.
Posted on Apr 17 / 2025
Understanding PCI DSS Compliance: Penetration Testing, Quarterly Scanning, QSA, and SAQ Guidance
Learn the essentials of PCI DSS compliance, including penetration testing, quarterly vulnerability scanning, and the role of QSAs and SAQs. Stay ahead of cyber threats and ensure secure payment transactions. Contact Echelon Risk + Cyber to streamline your compliance strategy.
Posted on Apr 15 / 2025
Networking and Giving Back: Brayden's Keys to Career Success
Discover Brayden's journey from Minecraft modder to Cybersecurity Consultant at Echelon. Learn how passion, mentorship, and human connection fueled his success in the cybersecurity world.
Posted on Apr 15 / 2025
Intelligence
in
Not for Profit
Cyber Intelligence Weekly (April 13, 2025): Our Take on Three Things You Need to Know
Posted on Apr 13 / 2025
Cyber Intelligence
Weekly
Join Echelon’s 31K+ subscribers and stay current on cybersecurity trends and insights.
Click here to view all editions below
Sign up to our newsletter
Category
All Categories
Career Tips
Code Blue
Defensive Security
Financial Services
Government/Public Sector
Healthcare
Higher Education
Improving Cyber Hygiene
Manufacturing
Not for Profit
Offensive Security
Other
Our People
Professional Services
Retail
Risk Advisory + Compliance
Sports and Entertainment
Technology & SaaS
vCISO
Types
All Types
Announcement
Article
Case Study
Guide
Playbook
Threat Alert
Webinar
Whitepaper
Cyber Threat Alert: Abusing AZUREADSSOACC for Pivoting from On-Premises Active Directory to Azure
Learn how threat actors exploit AZUREADSSOACC to pivot from on-premises Active Directory to Azure. Get actionable defenses to secure your hybrid identity environment.
Posted on Mar 19 / 2025
Exploiting the Active Directory Machine Account Quota (MAQ): RBCD, Privilege Escalation, and Backdoor Account Creation
Learn about Machine Account Quota (MAQ) attacks in Active Directory, where attackers exploit machine account creation and misconfigurations to escalate privileges, maintain persistence, and perform Resource-Based Constrained Delegation (RBCD). This article covers techniques such as manipulating delegation permissions and crafting Kerberos tickets to gain unauthorized domain access, including practical examples and tools for detecting and mitigating these threats.
Posted on Feb 19 / 2025
The Security Paradox: Flaws in DeepSeek Expose Industry-Wide AI Safety Challenges
DeepSeek R1’s security flaws highlight critical AI safety risks, from data exposure to adversarial attacks. Learn how vulnerabilities in open-source AI models compromise cybersecurity and what mitigation strategies organizations should adopt.
Posted on Feb 13 / 2025
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
We’re excited to share the 5 most-read articles of the year. These articles stand out for their relevance, depth, and impact on the ongoing cybersecurity dialogue. Whether you’re a seasoned pro or just starting to dive into the world of cybersecurity, these pieces offer valuable perspectives on the challenges and solutions facing today’s digital landscape.
Posted on Dec 18 / 2024
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection
Discover expert strategies from Echelon to enhance your organization's cybersecurity during Cybersecurity Awareness Month. Learn about training enhancements, cyber exercise benefits, internal testing, and building a culture of awareness to strengthen cyber defenses.
Posted on Oct 01 / 2024
The Latest in FedRAMP Compliance: Breaking Down Red Teaming for Enhanced Security
FedRAMP announced a new red team requirement impacting cloud service providers. This article breaks down the details of the requirement and the difference between red teaming and pen testing.
Posted on Apr 18 / 2024
Level-Up Your Testing with Adversarial-Based Red Teaming and the TIBER-EU Framework
Traditional penetration testing may not be enough to simulate real-world attack scenarios. Discover the benefits of adversarial-based red teaming with the TIBER-EU Framework to improve your organization's ability to detect, respond to, and mitigate sophisticated attacks.
Posted on Apr 27 / 2023
Cyber Definition Problems: Red Teaming vs. Penetration Testing
Cybersecurity terms like "red teaming" and "penetration testing" are often used interchangeably, leading to confusion and misinformation. This article explores the differences between these assessments and why the misuse of terms can be detrimental to the industry.
Posted on Apr 17 / 2023
Case Study: MetaOptima Enhances Security Practices through a Web Application Assessment
As an organization that stores sensitive medical data, MetaOptima is focused on investing in their security posture. Here's how Echelon Risk + Cyber helped ensure they are functioning at their most secure level.
Posted on Feb 22 / 2022
Continuous Penetration Testing: Shattering the Hourglass
Threats are continuously evolving - your pen testing should too. As attackers constantly find new vulnerabilities to exploit, a continuous penetration testing approach persistently emulates threat actor activity within a company’s unique environment, helping them stay secure over time.
Posted on Jan 31 / 2022
Risk + Cyber Perspectives: Securing Financial Services
In this video discussion with Matt Tolbert, Senior Cybersecurity Examiner for the Federal Reserve Bank of Cleveland, Matt and Dan discuss risks of remote workforces, planning for disruptions, mitigating 3rd party risks, going to the cloud, supply chain threats, and resilience in the future.
Posted on Oct 07 / 2021
Case Study: Bell and Howell Improves Cyber Posture with Echelon’s Unique Collaborative Approach to Pen Testing
Bell and Howell partnered with Echelon Risk + Cyber to test the security of their systems, ensuring that they will continue to be protected from future cyberattacks and avoid any future disruption to their systems.
Posted on Oct 06 / 2021
Mission Matters Interview: Dan Desko + Adam Torres
Our CEO and Founder Dan Desko was recently interviewed for Mission Matters Innovation with Adam Torres. The interview focuses on our core belief that security and privacy are basic human rights. We're built to live that mission every day.
Posted on Oct 06 / 2021
Banking in the Cloud: Key Considerations for IT Leaders
Considering a move to the cloud? There's a lot to think about, especially for financial institutions. This article lays out those obstacles and some considerations for overcoming them.
Posted on Sep 28 / 2021
Four Ways to Spice Up Your Penetration Testing Routine
Another year, another penetration test? Attackers are evolving, and so should you. Here are four ways to spice up your pen testing routine to be better prepared and reduce your attack surface.
Posted on Sep 22 / 2021
DefCon 29 in Review: The Best Sessions, Badge Spoilers and More
Have you solved your badges yet? With another DefCon in the books, here's our take on the best sessions and a close up look at some of the badges.
Posted on Aug 26 / 2021
Cyber Intelligence Weekly (Aug 15, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: data breach at T-Mobile, Apple's privacy nightmare, and Microsoft needs to patch patching.
Posted on Aug 16 / 2021
Cyber Intelligence Weekly (Aug 8, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Federal agencies failing at cyber, Apple scans your iCloud photos, and a disgruntled ransomware worker acts out.
Posted on Aug 08 / 2021
Cyber Intelligence Weekly (Aug 1, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: President Biden's memorandum on Critical Infrastructure Cybersecurity, an FBI official advises against banning ransomware payments, and the search engine for hackable websites returns.
Posted on Aug 01 / 2021
Flexible & Secure Remote Penetration Testing in a Changing World
Over the past year and a half, the worldwide workforce underwent a drastic and rapid paradigm shift that has brought with it new opportunities, attack vectors, and methods to test security. When testing security with penetration testing, partner with a firm using the most modern, advanced tactics to test your readiness for tomorrow’s attackers.
Posted on Jul 29 / 2021
Are you ready to get started?
Are you ready to get started?
Contact Us