EchoMark Blog

Stay up to date with EchoMark's product, insider threat, and data exfiltration news.

Company news
Insider threat
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
July 16, 2024
Using Invisible Forensic Watermarks to Prevent Insider Information Leaks

Effective teamwork requires sharing information, but unintended data leaks can cause significant harm. EchoMark's invisible forensic watermarks enhance security by preventing and tracing unauthorized data sharing and disclosure.

Image with screenshot of SecureView analytics and file sharing.
June 18, 2024
Introducing SecureView: The Most Secure Way to Share Your Private Information

Today, I am excited to announce the public availability of SecureView, the most secure way to share information. Now, anyone can securely and easily share information with others.

A statue of Lady Justice on a desk next to a laptop with confidential files on the screen, and papers strewn across the desk.
May 22, 2024
Whistleblower or Leaker? Navigating the Gray Area in Data Privacy, Security, and Public Interest

How do you navigate ethical challenges and protect organizational integrity? Discover the crucial differences between whistleblowers and leakers, their motives and justifications, legal protections, and impact to data privacy.

April 17, 2024
Insider Alert: Unveiling Public Sector Culprits Behind History's Most Notorious Leaks

Explore the complex motives, the aftermath, and the ongoing debates about security, privacy, and the thin line between whistleblowing and betrayal in these infamous leaks. From classified documents to tax secrets, we trace the footsteps of those who crossed the line and shook the foundations of the public sector.

AI generated Data Leak Illustration - Data flowing out of a laptop computer that is sitting on top of a pile of money
April 8, 2024
Insider Threats Exposed: Overview of Q1 2024 Data Leaks and Breaches

The first quarter of 2024 saw significant information and communication leaks across major corporations in various industries, bringing into focus the hard reality: information is as vulnerable as it is valuable.

Illustration of a man sitting at a desk, working on his laptop. Security symbols and graphics float above and around him.
April 2, 2024
'Goodbye' to the Analog Hole: How we use AI to facilitate seamless trusted data sharing with EchoMark Pixel™

In digital content protection, the “analog hole” represents a unique and persistent challenge. Get insights into how EchoMark is pioneering trusted, hassle-free data sharing, and understand how far we’ve come and what we have learned about AI along the way.

graphical image of complex interconnected squares and cubes meant to illustrate steganography
March 28, 2024
Steganography: The Tables Have Turned

Steganography – the art of hiding secrets in plain sight, is the basis of one of the oldest espionage tactics that has transformed into much more.

EchoMark logo on a gradient background.
September 26, 2023
Announcing EchoMark: Launching an AI-powered Solution to Safeguard Private Communications in the Digital Age

EchoMark provides an entirely new way to manage insider risk while ensuring private information still efficiently flows to those who need it so they can do their best work. EchoMark utilizes invisible forensics watermarking technologies to help keep private information private. EchoMark is designed with a deep understanding of human behaviors and built using Artificial Intelligence (AI) with Large Language Models (LLM) and computer vision to collectively maximize effectiveness.

A screenshot of a Leak Report featuring graphs and statistics that show someone named Sue is the source of a leak.
September 26, 2023
How EchoMark works

How EchoMark adds forensic marks to documents and messages, and how to investigate leaks using those marks.

Illustration of a woman with three speech bubbles stacked vertically reading, "Nice to meet you," "Good to meet you," and "Great to meet you."
September 26, 2023
AI Rephrasing: The New Tech that Protects Private Communications

In a perfect world, organizations could circulate emails containing confidential information – financial data, new product developments, or other intellectual property – to stakeholders without risk of it ending up in the hands of competitors or the evening news.

Illustration of a woman standing behind a desk, holding a document. A man in the foreground is seated at the desk watching her read the document.
September 26, 2023
The human psychology behind preventing IP theft

How certainty of apprehension deters insider threats more than severity of punishment.

A profile photo of Colin Brissey, a white male with a shaved head wearing glasses and a suit.
September 26, 2023
Why I joined EchoMark

Building something new in cybersecurity with great people.

Stay up to date with EchoMark's product, insider threat, and data exfiltration news.

Subscribe for updates

Sign up for updates as we publish more.