Landon Winkelvoss

What does “Outside the Firewall” Mean to Nisos

What does “Outside the Firewall” Mean to Nisos

You have heard us say that Nisos is an expert at identifying risk and disrupting adversaries “outside the firewall.” Since we say it regularly, it’s probably worthwhile to make sure you know what “outside the firewall” means to Nisos, our partners, our clients, and...

read more
An Introduction to Honeypots

An Introduction to Honeypots

In our latest blog series, we discuss how threat intelligence can be applied smarter for medium sized organizations with limited resources. We discuss ways to proactively detect threats beyond subscribing to information feeds that require a lot of resources to...

read more
Avoiding Ransomware

Avoiding Ransomware

Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night. Ransomware is not a threat; it is a capability criminals use with an intent of monetizing illegal...

read more
Podcast Platitudes

Podcast Platitudes

Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes its consumers better at...

read more
Four Future Trends of Disinformation Campaigns

Four Future Trends of Disinformation Campaigns

While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well. Much of the discourse on ‘fake news’ these days conflates three...

read more
Using Threat Intelligence to Counter Platform Abuse

Using Threat Intelligence to Counter Platform Abuse

Companies whose products serve as collaboration platforms play a key role in our increasingly cloud native and remote work environment. The technology allows companies to achieve clear business opportunities, but also cause unique security challenges. Not only must...

read more
Threat Intelligence Use Cases for Trust and Safety

Threat Intelligence Use Cases for Trust and Safety

Varied threats like disinformation, platform abuse, brand dilution, strategic breach campaigns, extortion, insider threats and nation states stealing intellectual property are more prevalent than ever. More and more of these threats live far outside the traditional...

read more
Advancing OSINT to Turn Data into Intelligence

Advancing OSINT to Turn Data into Intelligence

While cyber threat analysts are critical to determine what cyber threats are relevant to their respective organizations so they can take the appropriate action, open source intelligence (OSINT) and investigations can often be the added value to address the “how”,...

read more
Considerations for Securing Container Environments

Considerations for Securing Container Environments

Containers are popular because they are a cost-effective way to build, package, and promote an application or service, and all its dependencies, throughout its entire lifecycle and across different on-prem, cloud, or hybrid environments. However, major security risks...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.

Adversary Insights℠ RFI Subscription
Timely response to client-specific requests for finished intelligence on cyber and physical risks
OSINT Monitoring & Analysis
Client-specific curation and analysis of dark web, open source, and social media data
External Attack Surface Monitoring & Analysis
Defense against attacks to your digital perimeter and internal environment
Executive Shield
Discovery of threats to key personnel with attribution and PII takedown
Threat Landscape Assessment
Analysis of external threats to assess level of risk and identify methods of mitigation
Zero Touch Diligence®
Discovery and analysis to assess risk for investments, IPO, M&A, and third parties
Event-Driven Intel Investigation
Multidimensional security fact-finding in response to adversary behavior