Our Blog

Check back for weekly updates

Using Selectors For Open Source Intelligence

Using Selectors For Open Source Intelligence

BlogUsing Selectors For Open Source Intelligence A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical...

read more
The Myth of Complex Passwords

The Myth of Complex Passwords

BlogThe Myth of Complex Passwords Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more...

read more
Avoiding Ransomware

Avoiding Ransomware

BlogAvoiding Ransomware Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night. Ransomware is not a threat; it is a capability criminals use with an intent...

read more
Podcast Platitudes

Podcast Platitudes

BlogPodcast Platitudes Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes...

read more
What Is Digital Identity Reduction and Why Does It Matter?

What Is Digital Identity Reduction and Why Does It Matter?

BlogWhat Is Digital Identity Reduction and Why Does It Matter? The amount of information openly available on the internet about any given individual is staggering.More and more, privacy and online security are brought into the limelight and people are becoming more...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.