Our Blog
Check back for weekly updates
The Nisos Dogpile
BlogThe Nisos Dogpile As co-founders, Justin and I have had thousands of conversations about Nisos with prospects, clients, investors, and peers in the cybersecurity and investigations industry. The question always comes up, “How are you different?” One of the...
Real Cyber Intelligence Tells a SOC What Its Security Stack Cannot Detect
BlogReal Cyber Intelligence Tells a SOC What Its Security Stack Cannot Detect Actionable cyber threat intelligence should inform a security operations center’s prioritization of the most critical applications and infrastructure to the business and threat hunt program...
Threat Intelligence Through the Eyes of Adversaries
BlogThreat Intelligence Through the Eyes of Adversaries Any adversary conducts reconnaissance on a potential target with one question in mind: is the time and resources for research, development, and exploitation, going to be worth the gain? Below are four insights on...
How to Use Context to Secure Your Platforms
BlogHow to Use Context to Secure Your Platforms Attribution often gets a bad name in the cybersecurity industry. Attribution can be challenging and may not lead to a direct business outcome is a common refrain. Companies that operate digital platforms have a unique...
Common Network Segmentation Strategies for Production Environments
BlogCommon Network Segmentation Strategies for Production Environments Business needs for all company sizes increasingly require managed production environments to perform critical computational and data storage roles that are often administered by company IT...
Three Steps to Work with the Business and Get Your Security Team a Seat at the Table
BlogThree Steps to Work with the Business and Get Your Security Team a Seat at the Table Corporations big and small at least place some emphasis on cybersecurity, but when it comes to establishing a company strategy with data security in mind, many security leaders...
Three Things to Look for to Identify Context Around an Attack Quicker
BlogThree Things to Look for to Identify Context Around an Attack Quicker The cybersecurity industry has defined the term “attribution” of threat actors to refer to the identification of the specific actor or group of actors responsible for an attack. For many...
Cyber Diligence Provides Actionable Intelligence to M&A Teams
BlogCyber Diligence Provides Actionable Intelligence to M&A Teams Large companies take robust consultative approaches to integrating networks and applications post-acquisition. Rarely do acquiring security teams have the resources or cost-effective internal...
Managed Intelligence™: Four Factors for Building Adversarial Context
With limited time and resources for a SOC to prioritize threats for additional research, Mars CISO Andrew Stanley gives several important factors…
Managed Intelligence™: Four Outcomes from Operationalizing Intelligence for Third-Party Risk Management
Actionable intelligence is critical for third party risk management as it’s easy to chase false positives that waste resources…
Three Areas of Focus for Your Insider Threat Program During the COVID-19 Crisis
Security teams are settling in to the “new normal” of remote work as the COVID-19 crisis nears its third month here in the U.S. As many teams have discovered, among the myriad of logistical issues…
Managed Intelligence™: Shaping a Threat Hunt Program to Operationalize Data, Resource Accordingly, and Protect the Business
Deriving actionable intelligence to enhance organizational security is a challenge faced by all global companies and often further complicated by intertwined networks resulting from mergers and acquisitions…
Know Your Adversary™: Russian APTs
In the previous two articles in this series, we examined the Iranian and Nigerian Advanced Persistent Threats (APTs) under a sociohistorical lens in order to better understand the various drivers that instigate their threat activity…
Zero Touch Diligence®: Actionable Intelligence for Third-Party Risk Management
Security analysts responsible for vendor management have a unique combination of challenges, both human and technical…
Four Priorities for Aligning Your Insider Threat Program
Organizations based in the United States continue to deal with considerable intellectual property theft and largely do not address the issue until there is a problem…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.