Our Blog
Check back for weekly updates
Insider Threats: Challenges, Risks, Signs & Prevention
An insider threat is a security risk posed by a trusted individual within an organization – such as an employee, contractor, or partner – who misuse their access to…
Employment Fraud Indicators: What You Need to Know
Employment fraud can present a significant threat to businesses across all industries, with the potential to undermine operations and erode trust…
DPRK IT Fraud Network Uses GitHub to Target Global Companies
Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Vietnamese, Japanese, and Singaporean nationals with the goal of obtaining employment in remote engineering…
How Threat Monitoring Protects Executives from Emerging Risks
C-suite executives are frequently subject to threats and negative sentiment online…
Identifying and Preventing Employment Fraud
Remote work is driving an increase in employment fraud complexity and frequency…
DPRK IT Workers: A Hidden Cyber Threat to Japan
The Japanese government warned domestic companies in March 2024 about contracting North Korean (DPRK) IT workers posing as Japanese nationals to earn cash, as it is suspected…
Insider Threats & Digital Recruitment: A Growing Risk
Nisos routinely monitors mainstream and alternative social media platforms, as well as cloud-based messaging applications and dark web forums…
Nisos Awarded Built In Company Culture Awards in 2025
Nisos is honored to have been recognized by Built In’s 2025 Best Places to work…
Key Predictions for Human Risk in 2025
The landscape of human risk is evolving faster than ever before. From escalation of digital threats to physical violence and challenges caused by…
Executive Security: Protecting Leaders in a Digital World
It takes a combination of people and technology to attribute and solve executive protection problems and drive real-world consequences…
Insider Threat Indicators
Security threats can come from trusted individuals within your organization or partners, contractors, and service providers with authorized access to sensitive systems and data…
How Company Executives Can Mitigate Virtual Kidnapping Schemes
Virtual kidnapping, or virtual kidnapping for ransom, is a coercive telephonic scheme used to extort ransom payments from victims…
OSINT & Employment Fraud: Spotting Fake Candidates | Nisos
Employment fraud poses a significant risk to companies that depend heavily on a remote workforce…
PII Removal & Threat Monitoring: A Proactive Approach | Nisos
The availability of sensitive personal data through breaches and its continual sale online exposes individuals—and by extension employers—to a range of threats…
Extremist Video Games: A Growing Digital Threat
Nisos researchers examined The Great Rebellion, a video game available on popular gaming download platforms that pushes extremist, racist, and hateful pan-European ideology…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.