Our Blog
Check back for weekly updates
Using Selectors For Open Source Intelligence
BlogUsing Selectors For Open Source Intelligence A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical...
Making Threat Intelligence Useful for Medium-Sized Enterprises
BlogMaking Threat Intelligence Useful for Medium-Sized Enterprises Medium-sized enterprises that don’t have sophisticated security operations teams typically focus on the basic blocking and tackling of information security: policies around financial controls, incident...
How Adversaries Conduct Reconnaissance For Computer Network Operations
BlogHow Adversaries Conduct Reconnaissance For Computer Network Operations The adversarial mindset is the core that allows us to provide a world-class intelligence capability tailored to the needs of business. Many people ask what it means to have the adversarial...
Six Considerations for Building a Cyber Threat Intelligence Program
BlogSix Considerations for Building a Cyber Threat Intelligence Program When evaluating cyber threat intelligence programs for enterprise, organizations should consider six critical topics before spending on data. It’s natural for an organization to start from one of...
The Myth of Complex Passwords
BlogThe Myth of Complex Passwords Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more...
Three Steps to Use Threat Intelligence, Red Team, and Blue Team Collaboration to Improve Security
BlogThree Steps to Use Threat Intelligence, Red Team, and Blue Team Collaboration to Improve Security For many medium and large organizations, a penetration test that results in a “data breach” is going to lead to numerous findings that take months and sometimes years...
Avoiding Ransomware
BlogAvoiding Ransomware Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night. Ransomware is not a threat; it is a capability criminals use with an intent...
Podcast Platitudes
BlogPodcast Platitudes Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes...
What Is Digital Identity Reduction and Why Does It Matter?
BlogWhat Is Digital Identity Reduction and Why Does It Matter? The amount of information openly available on the internet about any given individual is staggering.More and more, privacy and online security are brought into the limelight and people are becoming more...
Four Future Trends of Disinformation Campaigns
BlogFour Future Trends of Disinformation Campaigns While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well. Much of the...
Three Ways to Improve Return on Investment for Threat Intelligence
BlogThree Ways to Improve Return on Investment for Threat Intelligence If a corporate threat intelligence program is merely focusing on indicators of compromise delivered to a security operations function, they should consider expanding their reach throughout the...
Hacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures
BlogHacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures In the new Work-From-Home world where non-essential companies have pivoted into a remote workforce model with increasing reliance on business tools that ensure connectivity,...
How to Use Breach Credentials to Support Intelligence Collection and Attribution
BlogHow to Use Breach Credentials to Support Intelligence Collection and Attribution While some organizations may view third party breach usernames and passwords as important indicators to prevent unauthorized access to their own networks, larger organizations are...
Steps for Medium Sized Businesses to Address Cyber Supply Chain Risk
BlogSteps for Medium Sized Businesses to Address Cyber Supply Chain Risk Any business operating on the internet with internet accessible services provides an opening for anyone else on the internet - good, bad, or indifferent - to interrogate those services and see...
Five Critical Data Source Considerations for Adversary Attribution
BlogFive Critical Data Source Considerations for Adversary Attribution Strong intelligence is the base of adversary attribution; nothing can replace the holistic picture created by technical indicators in combination with HUMINT and OSINT sources. While many cyber...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.