Our Blog

Check back for weekly updates

Using Threat Intelligence to Counter Platform Abuse

Using Threat Intelligence to Counter Platform Abuse

BlogUsing Threat Intelligence to Counter Platform Abuse Companies whose products serve as collaboration platforms play a key role in our increasingly cloud native and remote work environment. The technology allows companies to achieve clear business opportunities, but...

read more
Threat Intelligence Use Cases for Trust and Safety

Threat Intelligence Use Cases for Trust and Safety

BlogThreat Intelligence Use Cases for Trust and Safety Varied threats like disinformation, platform abuse, brand dilution, strategic breach campaigns, extortion, insider threats and nation states stealing intellectual property are more prevalent than ever. More and...

read more
The Rise of Synthetic Audio Deepfakes

The Rise of Synthetic Audio Deepfakes

BlogThe Rise of Synthetic Audio Deepfakes Can Audio Deepfakes Really Fake a Human? Audio deepfakes are the new frontier for business compromise schemes and are becoming more common pathways for criminals to deceptively gain access to corporate funds. Nisos recently...

read more
Advancing OSINT to Turn Data into Intelligence

Advancing OSINT to Turn Data into Intelligence

BlogAdvancing OSINT to Turn Data into Intelligence While cyber threat analysts are critical to determine what cyber threats are relevant to their respective organizations so they can take the appropriate action, open source intelligence (OSINT) and investigations can...

read more
Unexpected Benefits of Third Party Risk Management

Unexpected Benefits of Third Party Risk Management

BlogUnexpected Benefits of Third Party Risk Management One of the most interesting engagements we’ve seen at Nisos, and there have been many, is straight out of a binge-worthy Netflix drama. A publicly-traded company enters a new business partnership with a seemingly...

read more
Considerations for Securing Container Environments

Considerations for Securing Container Environments

BlogConsiderations for Security Controls in Containerized and Virtual Environments Containers are popular because they are a cost-effective way to build, package, and promote an application or service, and all its dependencies, throughout its entire lifecycle and...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.