Our Blog
Check back for weekly updates
Human Risk in Geopolitical Conflict: Iran War Lessons
The war in the Middle East that began on February 28th has dominated headlines, disrupted markets, and forced boardrooms into emergency conversations about exposure…
Digital Executive Protection: Monitoring Executive Threats Online
Executive protection teams face the difficult task of evaluating threats that can emerge from many directions: social media posts, emails, phone calls, and sometimes in-person encounters…
DPRK Remote Worker Fraud: A CPO’s Real Interview Experience
I already knew and that’s what made it so unsettling. Before the video call interview even connected, our team had flagged the candidate…
Digital Footprint Exposure: What’s Public and Why It Matters
Whether you’re a CEO, a celebrity, or just someone who values their privacy, your digital footprint is likely much larger and more revealing than you realize…
DPRK IT Worker Fraud: Inside a Laptop Farm Operation
When a lead AI architect applied for a remote position at our company, something didn’t feel right. The resume was polished, the credentials impressive, but small inconsistencies stood out to our hiring team.
DPRK IT Worker Fraud: Hiring an Insider Threat
Here at Nisos, we’ve spent years helping organizations understand and mitigate complex, human risk-related threats, such as insider risk, executive protection and employment fraud…
AI-Powered Threats Targeting High-Profile Individuals
Artificial intelligence isn’t just transforming industries – it’s revolutionizing the threat landscape for high-profile individuals across all sectors…
Operation Red Card 2.0: Cybercrime Disruption
On February 18, 2026, INTERPOL announced the results of Operation Red Card 2.0, a sweeping multinational law enforcement action targeting online scams across sixteen African countries…
Insider Threat Indicators Beyond the Firewall
Insider threats rarely start with a dramatic breach. Instead, they begin quietly. A shift in behavior. A suspicious or unauthorized external contact. An unexplained access request…
Digital Hygiene for High-Profile Individuals
Digital vulnerability isn’t limited to corporate executives. Any individual with a public profile faces similar – and sometimes even greater – digital exposure risks…
Executive Protection Digital Hygiene Playbook
In today’s interconnected world, executive protection extends far beyond physical security measures. As threat actors become increasingly sophisticated…
Employment Fraud & Hiring Risk: When Access Becomes Risk
Hiring has long been treated as an administrative function. Once a candidate clears background checks and completes onboarding, trust is assumed…
Modern Executive Protection: Digital Exposure & Physical Risk
Executive protection has long focused on physical security measures such as trained personnel, secure travel, and site assessments…
Security Predictions 2026: Insider Risk & Trust
As 2026 begins, insider risk and human‑driven threats are expected to continue shaping the security environment in ways enterprise leaders increasingly feel…
How OSINT Strengthens Executive Threat Intelligence
High-profile leaders face risks that often start online and can lead to real-world consequences. Personal information exposed across public sources can be…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.














