Our Blog
Check back for weekly updates
Managed Intelligence™: An Overview on Signature and Personality-Based Attributions to Mitigate Risk for the Business
Continuing with the Nisos® series on providing context to enable actionable outcomes for Security Operations Centers…
Managed Intelligence™: Transitioning Cyber Threat Information to Actionable Threat Intelligence Provides Critical Context
Major organizations with significant intellectual property and brand name reputation face a constant onslaught of targeted cyber…
Tracing the Technology Origin of a Presidential Candidate Deepfake
The recent tweet of a doctored photo, turned into a GIF and nicknamed “Sloppy Joe”, of US presidential candidate…
Securing Linux Against Negligent or Malicious Administrators
Linux monitoring is deceptively difficult. The most common tools for performing monitoring…
Risk and Reward – The Importance of Knowing the Network
The CISO’s role continues to evolve with the variables that change around them…
Disinformation in the Time of Pandemics
So here we are, caught in the middle of a pandemic stemming from some failed…
Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce
While the rapid shift from office to home or remote-based activity has allowed work to continue…
Cybersecurity Diligence is Financial Diligence
Healthy deal flow that enables investment at a price point in line with an exit strategy is the foundation…
Insider Threat Indicators to Help Baseline an Insider Threat Program
Insider Threats aren’t just individual malicious employees. They may be anyone who had or has…
Cybersecurity Diligence Doesn’t Need to be a Heavy Lift
Corporations large and small have always used acquisitions as a staple of their strategies to enter new markets…
Deep Fakes
This paper examines the illicit ecosystem for deep fakes…
Compromise Assessments: For Remote Workforce
Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce…
Know Your Adversary™: Iran
While researching advanced persistent threats (APTs), the common analytic angle has always been to identify malware…
M&A Should Stand for “Mitigate, Not Avoid”
We’ve all read the horror stories over the past several years – the revelation of prior data breach in a target organization…
Cyber Hygiene for a Remote Workforce
With coronavirus gaining strength worldwide, a lot of companies are faced with something that they may have been avoiding…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.