Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Blog

2 min read

Three Ways to Improve Return on Investment for Threat Intelligence

By Landon Winkelvoss on Aug 26, 2020 9:48:57 AM

If a corporate threat intelligence program is merely focusing on indicators of compromise delivered to a security operations function, they should consider expanding their reach throughout the organization. Mature and maturing security programs spend significant time gathering feedback throughout the enterprise to do what’s good for the business.

Continue Reading
4 min read

Hacker Diplomacy: How to Minimize Business Risks Stemming from Vulnerability Disclosures

By Jennifer DeTrani, General Counsel of Nisos on Aug 24, 2020 12:22:01 PM

In the new Work-From-Home world where non-essential companies have pivoted into a remote workforce model with increasing reliance on business tools that ensure connectivity, there is a growing concern that tools like Zoom may not be vetted to the full extent of their now-applicable use case.  And even outside of work, with consumers turning away from gyms and malls and moving their children into virtual environments for schooling, the question remains as to when the cracks in the foundation will come to light, and who will shine the light on them to the companies who are the custodians of our new normal.  

Continue Reading
1 min read

Steps for Medium Sized Businesses to Address Cyber Supply Chain Risk

By Landon Winkelvoss on Aug 17, 2020 7:24:47 AM

Any business operating on the internet with internet accessible services provides an opening for anyone else on the internet - good, bad, or indifferent - to interrogate those services and see what’s running. 

Continue Reading
2 min read

Translating Cyber Threat Intelligence for the Rest of the Business

By Landon Winkelvoss on Aug 10, 2020 10:16:53 AM

For enterprise businesses, especially in the technology, finance, and manufacturing sectors, the use cases and company consumers of intelligence work can be almost limitless. Therefore, it’s critical for a threat intelligence team to be transparent throughout the enterprise and openly promote the capabilities it can bring. 

Continue Reading
4 min read

Five Critical Data Source Considerations for External Threat Hunting

By Willis McDonald on Aug 5, 2020 10:16:30 AM

Strong intelligence starts with good sources and when it comes to gaining the most context around suspicious events or adversaries of interest, nothing beats external hunting.

Most current threat hunting is rightfully focused on hunting inside the firewalls of an enterprise, but often, security teams cannot reach definitive conclusions due to large scale visibility gaps and a lack of effective log aggregation. 

Continue Reading
3 min read

Three Types of Disinformation Campaigns that Target Corporations

By Mike Davis on Aug 4, 2020 4:34:46 AM

In 2018, The Washington Post named “misinformation” its “word of the year.” In 2019, NPR labelled “disinformation” the same.

Then 2020 happened. 

Continue Reading
2 min read

Using Threat Intelligence to Counter Platform Abuse

By Landon Winkelvoss on Aug 3, 2020 5:17:07 AM

Companies whose products serve as collaboration platforms play a key role in our increasingly cloud native and remote work environment. The technology allows companies to achieve clear business opportunities, but also cause unique security challenges. Not only must they protect their corporate and development systems like all enterprises (endpoints, network infrastructure, container and VM security, etc), they also need to protect customers' data on their platforms.

Continue Reading
1 min read

Threat Intelligence Use Cases for Trust and Safety

By Landon Winkelvoss on Jul 27, 2020 11:18:37 AM

Varied threats like disinformation, platform abuse, brand dilution, strategic breach campaigns, extortion, insider threats and nation states stealing intellectual property are more prevalent than ever.  More and more of these threats live far outside the traditional environment of analysts investigating potential cyber intrusions on their dashboards. 

Continue Reading
1 min read

Considerations for Measuring the Return on Investment of Cyber Threat Intelligence

By Landon Winkelvoss on Jul 19, 2020 4:48:19 PM

Security operations centers across the world are consumed with how to measure the return on investment of threat intelligence. There are different schools of thought, but we favor a model that measures actionable events. 

Continue Reading
2 min read

Advancing OSINT to Turn Data into Intelligence

By Landon Winkelvoss on Jul 13, 2020 1:56:35 PM

While cyber threat analysts are critical to determine what cyber threats are relevant to their respective organizations so they can take the appropriate action, open source intelligence (OSINT) and investigations can often be the added value to address the “how”, “why”, and sometimes “who” that brings much needed context. 

Continue Reading
2 min read

Three Considerations for Measuring Return on Investment from Threat Hunting

By Landon Winkelvoss on Jul 8, 2020 10:26:06 AM

Threat hunting often has ill-defined metrics for organizations attempting to measure “return on investment.” If an analyst isn’t finding bad actors in the environment, leadership may question the value they are bringing. If they are finding a lot of actors, leadership may question how effective they are at their job if incident response is constantly being called for false alarms. Furthermore, questions will arise, depending on how long the actors were present in the network, the severity of the breach and if disclosures need to occur.

Continue Reading
1 min read

Two Considerations for Building a Security Program Grounded in Diversity and Inclusion

By Landon Winkelvoss on Jul 6, 2020 10:32:14 AM

Corporate security programs for major organizations deal with a variety of threats at a staggering global scale and there are playbooks to deal with many of these issues. Above all else, though, the most important task is building trust with the workforce according to recent remarks made by Uber’s Global Head of Security Resilience and Partnerships Dan Williams. 

Continue Reading

Featured