Blog

Using Selectors For Open Source Intelligence

Using Selectors For Open Source Intelligence

BlogUsing Selectors For Open Source Intelligence A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical...

read more
The Myth of Complex Passwords

The Myth of Complex Passwords

BlogThe Myth of Complex Passwords Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more...

read more
Avoiding Ransomware

Avoiding Ransomware

BlogAvoiding Ransomware Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night. Ransomware is not a threat; it is a capability criminals use with an intent...

read more
Podcast Platitudes

Podcast Platitudes

BlogPodcast Platitudes Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes...

read more
What Is Digital Identity Reduction and Why Does It Matter?

What Is Digital Identity Reduction and Why Does It Matter?

BlogWhat Is Digital Identity Reduction and Why Does It Matter? The amount of information openly available on the internet about any given individual is staggering.More and more, privacy and online security are brought into the limelight and people are becoming more...

read more
Four Future Trends of Disinformation Campaigns

Four Future Trends of Disinformation Campaigns

BlogFour Future Trends of Disinformation Campaigns While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well. Much of the...

read more
Using Threat Intelligence to Counter Platform Abuse

Using Threat Intelligence to Counter Platform Abuse

BlogUsing Threat Intelligence to Counter Platform Abuse Companies whose products serve as collaboration platforms play a key role in our increasingly cloud native and remote work environment. The technology allows companies to achieve clear business opportunities, but...

read more
Threat Intelligence Use Cases for Trust and Safety

Threat Intelligence Use Cases for Trust and Safety

BlogThreat Intelligence Use Cases for Trust and Safety Varied threats like disinformation, platform abuse, brand dilution, strategic breach campaigns, extortion, insider threats and nation states stealing intellectual property are more prevalent than ever. More and...

read more
The Rise of Synthetic Audio Deepfakes

The Rise of Synthetic Audio Deepfakes

BlogThe Rise of Synthetic Audio Deepfakes Can Audio Deepfakes Really Fake a Human? Audio deepfakes are the new frontier for business compromise schemes and are becoming more common pathways for criminals to deceptively gain access to corporate funds. Nisos recently...

read more
Advancing OSINT to Turn Data into Intelligence

Advancing OSINT to Turn Data into Intelligence

BlogAdvancing OSINT to Turn Data into Intelligence While cyber threat analysts are critical to determine what cyber threats are relevant to their respective organizations so they can take the appropriate action, open source intelligence (OSINT) and investigations can...

read more
Unexpected Benefits of Third Party Risk Management

Unexpected Benefits of Third Party Risk Management

BlogUnexpected Benefits of Third Party Risk Management One of the most interesting engagements we’ve seen at Nisos, and there have been many, is straight out of a binge-worthy Netflix drama. A publicly-traded company enters a new business partnership with a seemingly...

read more
Considerations for Securing Container Environments

Considerations for Securing Container Environments

BlogConsiderations for Security Controls in Containerized and Virtual Environments Containers are popular because they are a cost-effective way to build, package, and promote an application or service, and all its dependencies, throughout its entire lifecycle and...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.