Our Blog
Check back for weekly updates
North Korean IT Workers Are Targeting Your Hiring Pipeline
Earlier this year, a suspected North Korean IT worker applied for a job at Nisos. We investigate employment fraud and insider threats as core services…
Employment Identity Theft: Risks, Examples & Detection
Employment identity theft is no longer limited to stolen documents or fake tax filings. It now shows up in hiring pipelines, remote interviews, and onboarding processes…
DPRK Employment Fraud Targeting Crypto Companies
In June 2025, a candidate named “Jo” applied to Nisos for a remote Lead AI Architect role. On paper, he looked strong: 15+ years of experience…
Digital Risk to Executives: HR’s Role in Executive Protection
Executives are increasingly targeted based on their digital footprint, not just their corporate access…
Digital Exposure Ecosystem: Data Brokers & Dark Web Risk
For security professionals tasked with protecting high-profile individuals, understanding the digital exposure ecosystem is no longer optional…
Human Risk in Geopolitical Conflict: Iran War Lessons
The war in the Middle East that began on February 28th has dominated headlines, disrupted markets, and forced boardrooms into emergency conversations about exposure…
Digital Executive Protection: Monitoring Executive Threats Online
Executive protection teams face the difficult task of evaluating threats that can emerge from many directions: social media posts, emails, phone calls, and sometimes in-person encounters…
DPRK Remote Worker Fraud: A CPO’s Real Interview Experience
I already knew and that’s what made it so unsettling. Before the video call interview even connected, our team had flagged the candidate…
Digital Footprint Exposure: What’s Public and Why It Matters
Whether you’re a CEO, a celebrity, or just someone who values their privacy, your digital footprint is likely much larger and more revealing than you realize…
DPRK IT Worker Fraud: Inside a Laptop Farm Operation
When a lead AI architect applied for a remote position at our company, something didn’t feel right. The resume was polished, the credentials impressive, but small inconsistencies stood out to our hiring team.
DPRK IT Worker Fraud: Hiring an Insider Threat
Here at Nisos, we’ve spent years helping organizations understand and mitigate complex, human risk-related threats, such as insider risk, executive protection and employment fraud…
AI-Powered Threats Targeting High-Profile Individuals
Artificial intelligence isn’t just transforming industries – it’s revolutionizing the threat landscape for high-profile individuals across all sectors…
Operation Red Card 2.0: Cybercrime Disruption
On February 18, 2026, INTERPOL announced the results of Operation Red Card 2.0, a sweeping multinational law enforcement action targeting online scams across sixteen African countries…
Insider Threat Indicators Beyond the Firewall
Insider threats rarely start with a dramatic breach. Instead, they begin quietly. A shift in behavior. A suspicious or unauthorized external contact. An unexplained access request…
Digital Hygiene for High-Profile Individuals
Digital vulnerability isn’t limited to corporate executives. Any individual with a public profile faces similar – and sometimes even greater – digital exposure risks…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.














