Company Details
echelon-sri-lanka
32
26,203
511
echelon.lk
0
ECH_3107928
In-progress

Echelon Company CyberSecurity Posture
echelon.lkIntelligent Storytelling The one thing that will define the Echelon magazine will be the quality of the storytelling. Echelon,published monthly, will cover in depth Sri Lanka’s most successful businesses, examine their winning strategiesand profile their leaders in immersive stories. Great stories are also never limited to words, and our approach includes rich photography, bold graphics and leading edge design which together will make for a compelling read. But business doesn’t start and end in a boardroom;it extends to the golf club greens, to international travel and to pursuits that blurthe lines between commercial venture and sheer passion. The Echelon team will present the best in business and lifestyle coverage that will appeal to an exclusive and affluent readership: an otherwise hard to reach demographic. Content will be developed by one of the most experienced and proven teams of editors, financial journalists, photographers and designers in the country.This team has already raised the bar for powerful and expertly crafted business news. Shamindra Kulamannage, will lead the editorial team.
Company Details
echelon-sri-lanka
32
26,203
511
echelon.lk
0
ECH_3107928
In-progress
Between 750 and 799

Echelon Global Score (TPRM)XXXX



No incidents recorded for Echelon in 2025.
No incidents recorded for Echelon in 2025.
No incidents recorded for Echelon in 2025.
Echelon cyber incidents detection timeline including parent company and subsidiaries

Intelligent Storytelling The one thing that will define the Echelon magazine will be the quality of the storytelling. Echelon,published monthly, will cover in depth Sri Lanka’s most successful businesses, examine their winning strategiesand profile their leaders in immersive stories. Great stories are also never limited to words, and our approach includes rich photography, bold graphics and leading edge design which together will make for a compelling read. But business doesn’t start and end in a boardroom;it extends to the golf club greens, to international travel and to pursuits that blurthe lines between commercial venture and sheer passion. The Echelon team will present the best in business and lifestyle coverage that will appeal to an exclusive and affluent readership: an otherwise hard to reach demographic. Content will be developed by one of the most experienced and proven teams of editors, financial journalists, photographers and designers in the country.This team has already raised the bar for powerful and expertly crafted business news. Shamindra Kulamannage, will lead the editorial team.


The complimentary premier lifestyle magazine celebrating the finest aspects of life in the South Downs. Reaching a highly discerning audience, Beautiful South is delivered direct through the doors of the 29,000 of most affluent homes in Petersfield, Winchester, Alresford, the Meon Valley, Havant, Ro

Joggling Board Press is a Charleston-based independent publishing company dedicated to the production of fiction and non-fiction books of quality that amplify the history, culture and character of the American southeast. The press was founded in 2003 by award-winning author Susan Kammeraad-Campbe

NP Communications, LLC is a leading publisher of nurse practitioner journals and reports, including The Pearson Report, American Journal for Nurse Practitioners, Women’s Health Care Journal, Nurse Practitioner World News and NP Practice Management. Visit WebNPOnline.com to search for articles,

Contentra Inc. delivers full life-cycle content management services to leading publishers, content aggregators, Fortune 500 companies and government organizations such as national libraries — all from its ISO-certified facilities. Contentra has offices across the United States, Europe, and India. T

TRAVELER Publications is a high-end, award-winning media company renowned for producing the highest quality content publications to promote Mexico… founded by Mayté Rodríguez Cedillo in 1998. The publications' distribution is world-wide during an entire year. The audience is the most affluent trav

The Worlds Leading Publications and Events on High Tech Agriculture Published in English and Spanish The First Choice for Advertisers to Reach Their Target Markets Organisers of International High Tech Agriculture Conferences Editorial Brief New AG International Magazines cover on a quarterly ba
.png)
AI coding tools boost productivity but introduce cybersecurity risks, from vulnerable code to data leaks and supply chain threats.
Cherokee Federal will acquire HESFP, the Salesforce practice of HigherEchelon, effective Nov. 1, adding specialized digital modernization...
Echelon Data Centres has partnered with controlled affiliates of Starwood Capital Group to acquire a 37-acre site near Milan.
Share. By Rosemary Ajayi. In today's hyperconnected world, cybersecurity has moved beyond firewalls and passwords. It now extends into the...
New rules on certain Communist Party organs suggest China's ruling party is aiming to standardise its decision-making process and that President Xi Jinping...
Indian IT services firm Echelon Edge has announced that it has been entrusted with managing OSS/BSS infrastructure for the first two phases of state-owned...
Full Sail University has expanded its emerging technology offerings significantly through additional degree programs, new facilities,...
When a cybersecurity expert vanishes without a trace, the only clue is a digital ghost left behind.
The Adelaide office will serve as a central hub for Echelon Edge's APAC operations, enabling closer collaboration with local enterprises and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Echelon is http://www.echelon.lk.
According to Rankiteo, Echelon’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, Echelon currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Echelon is not certified under SOC 2 Type 1.
According to Rankiteo, Echelon does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Echelon is not listed as GDPR compliant.
According to Rankiteo, Echelon does not currently maintain PCI DSS compliance.
According to Rankiteo, Echelon is not compliant with HIPAA regulations.
According to Rankiteo,Echelon is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Echelon operates primarily in the Book and Periodical Publishing industry.
Echelon employs approximately 32 people worldwide.
Echelon presently has no subsidiaries across any sectors.
Echelon’s official LinkedIn profile has approximately 26,203 followers.
Echelon is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Echelon does not have a profile on Crunchbase.
Yes, Echelon maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/echelon-sri-lanka.
As of November 28, 2025, Rankiteo reports that Echelon has not experienced any cybersecurity incidents.
Echelon has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Echelon has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.