Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Blog

3 min read

How Adversaries Conduct Reconnaissance For Fraud Operations

By Jackie Hicks on Sep 29, 2020 10:56:04 AM

Building on our series on the adversarial mindset, fraudsters will identify a target based on the ease and speed with which they are able to monetize their fraudulent activities.

Many of the reconnaissance steps involve a threat actor learning how a company conducts their business, and oftentimes,  fraudsters end up understanding the business almost as well as the company and its employees do.

Continue Reading
2 min read

Making Threat Intelligence Useful for Medium-Sized Enterprises

By Landon Winkelvoss on Sep 28, 2020 9:55:15 AM

Medium-sized enterprises that don’t have sophisticated security operations teams typically focus on the basic blocking and tackling of information security: policies around financial controls, incident response plans, data retention policies, disaster recovery around user access, lifecycle management policies.

Continue Reading
3 min read

How Adversaries Conduct Reconnaissance For Computer Network Operations

By Landon Winkelvoss & Mike Davis on Sep 23, 2020 10:28:44 AM

The adversarial mindset is the core that allows us to provide a world-class intelligence capability tailored to the needs of business. Many people ask what it means to have the adversarial mindset and how that differentiates Nisos. While it’s a complicated answer based on capability, we wanted to share some insights, from our first-hand experience, about how adversaries operate.

Continue Reading
2 min read

Six Considerations for Building a Cyber Threat Intelligence Program

By Landon Winkelvoss on Sep 21, 2020 9:37:01 AM

When evaluating cyber threat intelligence programs for enterprise, organizations should consider six critical topics before spending on data.

Continue Reading
2 min read

Three Steps to Use Threat Intelligence, Red Team, and Blue Team Collaboration to Improve Security

By Landon Winkelvoss on Sep 15, 2020 9:46:51 AM

For many medium and large organizations, a penetration test that results in a “data breach” is going to lead to numerous findings that take months and sometimes years to remediate.

Continue Reading
1 min read

Avoiding Ransomware

By Landon Winkelvoss on Sep 8, 2020 8:24:24 AM

Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night.

Continue Reading
1 min read

Podcast Platitudes

By Landon Winkelvoss on Sep 2, 2020 11:56:49 AM

Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes its consumers better at their jobs the day they consume it.

Continue Reading
2 min read

What is Digital Identity Reduction and Why Does it Matter?

By Seth Arthur on Sep 1, 2020 4:32:29 AM

The amount of information openly available on the internet about any given individual is staggering. 

More and more, privacy and online security are brought into the limelight and people are becoming more protective of their online presence. We urge our family, friends, and colleagues to follow general safety guidelines such as to use complex passwords, change them often, turn off geolocation services, and set profiles to private.

Continue Reading
2 min read

Four Future Trends of Disinformation Campaigns

By Landon Winkelvoss on Aug 31, 2020 11:42:52 AM

While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well.

Continue Reading
2 min read

Three Ways to Improve Return on Investment for Threat Intelligence

By Landon Winkelvoss on Aug 26, 2020 9:48:57 AM

If a corporate threat intelligence program is merely focusing on indicators of compromise delivered to a security operations function, they should consider expanding their reach throughout the organization. Mature and maturing security programs spend significant time gathering feedback throughout the enterprise to do what’s good for the business.

Continue Reading
4 min read

Hacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures

By Jennifer DeTrani, General Counsel of Nisos on Aug 24, 2020 12:22:01 PM

In the new Work-From-Home world where non-essential companies have pivoted into a remote workforce model with increasing reliance on business tools that ensure connectivity, there is a growing concern that tools like Zoom may not be vetted to the full extent of their now-applicable use case.  And even outside of work, with consumers turning away from gyms and malls and moving their children into virtual environments for schooling, the question remains as to when the cracks in the foundation will come to light, and who will shine the light on them to the companies who are the custodians of our new normal.  

Continue Reading
1 min read

Steps for Medium Sized Businesses to Address Cyber Supply Chain Risk

By Landon Winkelvoss on Aug 17, 2020 7:24:47 AM

Any business operating on the internet with internet accessible services provides an opening for anyone else on the internet - good, bad, or indifferent - to interrogate those services and see what’s running. 

Continue Reading

Featured