Our Blog
Check back for weekly updates
Managed Intelligence™: Shaping a Threat Hunt Program to Operationalize Data, Resource Accordingly, and Protect the Business
Deriving actionable intelligence to enhance organizational security is a challenge faced by all global companies and often further complicated by intertwined networks resulting from mergers and acquisitions…
Know Your Adversary™: Russian APTs
In the previous two articles in this series, we examined the Iranian and Nigerian Advanced Persistent Threats (APTs) under a sociohistorical lens in order to better understand the various drivers that instigate their threat activity…
Zero Touch Diligence®: Actionable Intelligence for Third-Party Risk Management
Security analysts responsible for vendor management have a unique combination of challenges, both human and technical…
Four Priorities for Aligning Your Insider Threat Program
Organizations based in the United States continue to deal with considerable intellectual property theft and largely do not address the issue until there is a problem…
Managed Intelligence™: An Overview on Signature and Personality-Based Attributions to Mitigate Risk for the Business
Continuing with the Nisos® series on providing context to enable actionable outcomes for Security Operations Centers…
Managed Intelligence™: Transitioning Cyber Threat Information to Actionable Threat Intelligence Provides Critical Context
Major organizations with significant intellectual property and brand name reputation face a constant onslaught of targeted cyber…
Tracing the Technology Origin of a Presidential Candidate Deepfake
The recent tweet of a doctored photo, turned into a GIF and nicknamed “Sloppy Joe”, of US presidential candidate…
Securing Linux Against Negligent or Malicious Administrators
Linux monitoring is deceptively difficult. The most common tools for performing monitoring…
Risk and Reward – The Importance of Knowing the Network
The CISO’s role continues to evolve with the variables that change around them…
Disinformation in the Time of Pandemics
So here we are, caught in the middle of a pandemic stemming from some failed…
Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce
While the rapid shift from office to home or remote-based activity has allowed work to continue…
Cybersecurity Diligence is Financial Diligence
Healthy deal flow that enables investment at a price point in line with an exit strategy is the foundation…
Insider Threat Indicators to Help Baseline an Insider Threat Program
Insider Threats aren’t just individual malicious employees. They may be anyone who had or has…
Cybersecurity Diligence Doesn’t Need to be a Heavy Lift
Corporations large and small have always used acquisitions as a staple of their strategies to enter new markets…
Deep Fakes
This paper examines the illicit ecosystem for deep fakes…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.