Our Blog
Check back for weekly updates
Four Future Trends of Disinformation Campaigns
BlogFour Future Trends of Disinformation Campaigns While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well. Much of the...
Three Ways to Improve Return on Investment for Threat Intelligence
BlogThree Ways to Improve Return on Investment for Threat Intelligence If a corporate threat intelligence program is merely focusing on indicators of compromise delivered to a security operations function, they should consider expanding their reach throughout the...
Hacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures
BlogHacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures In the new Work-From-Home world where non-essential companies have pivoted into a remote workforce model with increasing reliance on business tools that ensure connectivity,...
How to Use Breach Credentials to Support Intelligence Collection and Attribution
BlogHow to Use Breach Credentials to Support Intelligence Collection and Attribution While some organizations may view third party breach usernames and passwords as important indicators to prevent unauthorized access to their own networks, larger organizations are...
Steps for Medium Sized Businesses to Address Cyber Supply Chain Risk
BlogSteps for Medium Sized Businesses to Address Cyber Supply Chain Risk Any business operating on the internet with internet accessible services provides an opening for anyone else on the internet - good, bad, or indifferent - to interrogate those services and see...
Five Critical Data Source Considerations for Adversary Attribution
BlogFive Critical Data Source Considerations for Adversary Attribution Strong intelligence is the base of adversary attribution; nothing can replace the holistic picture created by technical indicators in combination with HUMINT and OSINT sources. While many cyber...
Translating Cyber Threat Intelligence for the Rest of the Business
BlogTranslating Cyber Threat Intelligence for the Rest of the Business For enterprise businesses, especially in the technology, finance, and manufacturing sectors, the use cases and company consumers of intelligence work can be almost limitless. Therefore, it’s...
Five Critical Data Source Considerations for External Threat Hunting
BlogFive Critical Data Source Considerations for External Threat Hunting Strong intelligence starts with good sources and when it comes to gaining the most context around suspicious events or adversaries of interest, nothing beats external hunting.Most current threat...
Three Types of Disinformation Campaigns that Target Corporations
BlogThree Types of Disinformation Campaigns that Target Corporations In 2018, The Washington Post named “misinformation” its “word of the year.” In 2019, NPR labelled “disinformation” the same. Then 2020 happened. Many of the disinformation actors taking advantage of...
Using Threat Intelligence to Counter Platform Abuse
BlogUsing Threat Intelligence to Counter Platform Abuse Companies whose products serve as collaboration platforms play a key role in our increasingly cloud native and remote work environment. The technology allows companies to achieve clear business opportunities, but...
Threat Intelligence Use Cases for Trust and Safety
BlogThreat Intelligence Use Cases for Trust and Safety Varied threats like disinformation, platform abuse, brand dilution, strategic breach campaigns, extortion, insider threats and nation states stealing intellectual property are more prevalent than ever. More and...
Considerations for Measuring the Return on Investment of Cyber Threat Intelligence
BlogConsiderations for Measuring the Return on Investment of Cyber Threat Intelligence Security operations centers across the world are consumed with how to measure the return on investment of threat intelligence. There are different schools of thought, but we favor a...
The Rise of Synthetic Audio Deepfakes
BlogThe Rise of Synthetic Audio Deepfakes Can Audio Deepfakes Really Fake a Human? Audio deepfakes are the new frontier for business compromise schemes and are becoming more common pathways for criminals to deceptively gain access to corporate funds. Nisos recently...
Establishing a System to Collect, Enrich, and Analyze Data to Generate Actionable Intelligence
BlogEstablishing a System to Collect, Enrich, and Analyze Data to Generate Actionable Intelligence In the era of data-driven decision making, the value of threat intelligence and interest in establishing or expanding threat intelligence programs is growing rapidly....
Advancing OSINT to Turn Data into Intelligence
BlogAdvancing OSINT to Turn Data into Intelligence While cyber threat analysts are critical to determine what cyber threats are relevant to their respective organizations so they can take the appropriate action, open source intelligence (OSINT) and investigations can...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.