Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Blog

2 min read

Six Considerations for Building a Cyber Threat Intelligence Program

By Landon Winkelvoss on Sep 21, 2020 9:37:01 AM

When evaluating cyber threat intelligence programs for enterprise, organizations should consider six critical topics before spending on data.

Continue Reading
2 min read

Three Steps to Use Threat Intelligence, Red Team, and Blue Team Collaboration to Improve Security

By Landon Winkelvoss on Sep 15, 2020 9:46:51 AM

For many medium and large organizations, a penetration test that results in a “data breach” is going to lead to numerous findings that take months and sometimes years to remediate.

Continue Reading
1 min read

Avoiding Ransomware

By Landon Winkelvoss on Sep 8, 2020 8:24:24 AM

Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night.

Continue Reading
1 min read

Podcast Platitudes

By Landon Winkelvoss on Sep 2, 2020 11:56:49 AM

Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes its consumers better at their jobs the day they consume it.

Continue Reading
2 min read

What is Digital Identity Reduction and Why Does it Matter?

By Seth Arthur on Sep 1, 2020 4:32:29 AM

The amount of information openly available on the internet about any given individual is staggering. 

More and more, privacy and online security are brought into the limelight and people are becoming more protective of their online presence. We urge our family, friends, and colleagues to follow general safety guidelines such as to use complex passwords, change them often, turn off geolocation services, and set profiles to private.

Continue Reading
2 min read

Four Future Trends of Disinformation Campaigns

By Landon Winkelvoss on Aug 31, 2020 11:42:52 AM

While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well.

Continue Reading
2 min read

Three Ways to Improve Return on Investment for Threat Intelligence

By Landon Winkelvoss on Aug 26, 2020 9:48:57 AM

If a corporate threat intelligence program is merely focusing on indicators of compromise delivered to a security operations function, they should consider expanding their reach throughout the organization. Mature and maturing security programs spend significant time gathering feedback throughout the enterprise to do what’s good for the business.

Continue Reading
4 min read

Hacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures

By Jennifer DeTrani, General Counsel of Nisos on Aug 24, 2020 12:22:01 PM

In the new Work-From-Home world where non-essential companies have pivoted into a remote workforce model with increasing reliance on business tools that ensure connectivity, there is a growing concern that tools like Zoom may not be vetted to the full extent of their now-applicable use case.  And even outside of work, with consumers turning away from gyms and malls and moving their children into virtual environments for schooling, the question remains as to when the cracks in the foundation will come to light, and who will shine the light on them to the companies who are the custodians of our new normal.  

Continue Reading
1 min read

Steps for Medium Sized Businesses to Address Cyber Supply Chain Risk

By Landon Winkelvoss on Aug 17, 2020 7:24:47 AM

Any business operating on the internet with internet accessible services provides an opening for anyone else on the internet - good, bad, or indifferent - to interrogate those services and see what’s running. 

Continue Reading
2 min read

Translating Cyber Threat Intelligence for the Rest of the Business

By Landon Winkelvoss on Aug 10, 2020 10:16:53 AM

For enterprise businesses, especially in the technology, finance, and manufacturing sectors, the use cases and company consumers of intelligence work can be almost limitless. Therefore, it’s critical for a threat intelligence team to be transparent throughout the enterprise and openly promote the capabilities it can bring. 

Continue Reading
4 min read

Five Critical Data Source Considerations for External Threat Hunting

By Willis McDonald on Aug 5, 2020 10:16:30 AM

Strong intelligence starts with good sources and when it comes to gaining the most context around suspicious events or adversaries of interest, nothing beats external hunting.

Most current threat hunting is rightfully focused on hunting inside the firewalls of an enterprise, but often, security teams cannot reach definitive conclusions due to large scale visibility gaps and a lack of effective log aggregation. 

Continue Reading
3 min read

Three Types of Disinformation Campaigns that Target Corporations

By Mike Davis on Aug 4, 2020 4:34:46 AM

In 2018, The Washington Post named “misinformation” its “word of the year.” In 2019, NPR labelled “disinformation” the same.

Then 2020 happened. 

Continue Reading

Featured