Our Blog
Check back for weekly updates
Managed Intelligence™: Four Outcomes from Operationalizing Intelligence for Third-Party Risk Management
Actionable intelligence is critical for third party risk management as it’s easy to chase false positives that waste resources…
Three Areas of Focus for Your Insider Threat Program During the COVID-19 Crisis
Security teams are settling in to the “new normal” of remote work as the COVID-19 crisis nears its third month here in the U.S. As many teams have discovered, among the myriad of logistical issues…
Managed Intelligence™: Shaping a Threat Hunt Program to Operationalize Data, Resource Accordingly, and Protect the Business
Deriving actionable intelligence to enhance organizational security is a challenge faced by all global companies and often further complicated by intertwined networks resulting from mergers and acquisitions…
Know Your Adversary™: Russian APTs
In the previous two articles in this series, we examined the Iranian and Nigerian Advanced Persistent Threats (APTs) under a sociohistorical lens in order to better understand the various drivers that instigate their threat activity…
Zero Touch Diligence®: Actionable Intelligence for Third-Party Risk Management
Security analysts responsible for vendor management have a unique combination of challenges, both human and technical…
Four Priorities for Aligning Your Insider Threat Program
Organizations based in the United States continue to deal with considerable intellectual property theft and largely do not address the issue until there is a problem…
Managed Intelligence™: An Overview on Signature and Personality-Based Attributions to Mitigate Risk for the Business
Continuing with the Nisos® series on providing context to enable actionable outcomes for Security Operations Centers…
Managed Intelligence™: Transitioning Cyber Threat Information to Actionable Threat Intelligence Provides Critical Context
Major organizations with significant intellectual property and brand name reputation face a constant onslaught of targeted cyber…
Tracing the Technology Origin of a Presidential Candidate Deepfake
The recent tweet of a doctored photo, turned into a GIF and nicknamed “Sloppy Joe”, of US presidential candidate…
Securing Linux Against Negligent or Malicious Administrators
Linux monitoring is deceptively difficult. The most common tools for performing monitoring…
Risk and Reward – The Importance of Knowing the Network
The CISO’s role continues to evolve with the variables that change around them…
Disinformation in the Time of Pandemics
So here we are, caught in the middle of a pandemic stemming from some failed…
Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce
While the rapid shift from office to home or remote-based activity has allowed work to continue…
Cybersecurity Diligence is Financial Diligence
Healthy deal flow that enables investment at a price point in line with an exit strategy is the foundation…
Insider Threat Indicators to Help Baseline an Insider Threat Program
Insider Threats aren’t just individual malicious employees. They may be anyone who had or has…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.