Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Blog

3 min read

Unexpected Benefits of Third Party Risk Management

By Mike Davis on Jun 24, 2020 10:56:47 AM

One of the most interesting engagements we’ve seen at Nisos, and there have been many, is straight out of a binge-worthy Netflix drama. A publicly-traded company enters a new business partnership with a seemingly innocuous third party, only to have the FBI at its door several months later asking real questions about international organized crime syndicates and money laundering.

Continue Reading
3 min read

Considerations for Securing Container Environments

By Landon Winkelvoss on Jun 22, 2020 11:58:07 AM

Containers are popular because they are a cost-effective way to build, package, and promote an application or service, and all its dependencies, throughout its entire lifecycle and across different on-prem, cloud, or hybrid environments. However, major security risks emerge in downstream repositories and subsequent logging of ephemeral objects that naturally disappear. 

Alan Orlikoski of Square shared his insights on how to mitigate some of these risks and conduct proper vulnerability management and incident response with regard to container environments.

Continue Reading
1 min read

Considerations for Security Controls in Containerized and Virtual Environments

By Landon Winkelvoss on Jun 15, 2020 12:04:34 PM

Current security controls will need to be re-defined based on how we protect the enterprise with two primary considerations: containerized and virtualized environments according to CIO and CISO of Risk Management Solutions (RMS) Dave Ruedger.

Continue Reading
5 min read

The Nisos Dogpile

By Landon Winkelvoss & Justin Zeefe on Jun 10, 2020 9:55:21 AM

As co-founders, Justin and I have had thousands of conversations about Nisos with prospects, clients, investors, and peers in the cybersecurity and investigations industry. The question always comes up, “How are you different?” One of the challenges with differentiation, especially as a services business, is so much of what we deliver is tied to intangibles like talent and process in people. “You know how many times vendors walk into my office and say they were former members of the US Intelligence Community?” was a popular response from prospective clients in the early days.

Continue Reading
2 min read

Threat Intelligence Through the Eyes of Adversaries

By Landon Winkelvoss & Tyler Robinson on Jun 8, 2020 12:12:28 PM

Any adversary conducts reconnaissance on a potential target with one question in mind: is the time and resources for research, development, and exploitation, going to be worth the gain? Below are four insights on threat intelligence from the eyes of adversaries.

Continue Reading
2 min read

How to Use Context to Secure Your Platforms

By Mike Davis on Jun 3, 2020 8:40:44 AM

Attribution often gets a bad name in the cybersecurity industry. Attribution can be challenging and may not lead to a direct business outcome is a common refrain. Companies that operate digital platforms have a unique advantage when it comes to attribution, however.

Continue Reading
2 min read

Three Steps to Work with the Business and Get Your Security Team a Seat at the Table

By Mike Davis on Jun 1, 2020 3:40:28 PM

Corporations big and small at least place some emphasis on cybersecurity, but when it comes to establishing a company strategy with data security in mind, many security leaders remain relegated to an “as-needed,” “cost-center” position. This paradigm places security teams in a no-win scenario. Once something bad happens, they are to blame and must react immediately but if nothing happens, there must not be a need to more deeply integrate privacy or data security as a feature of the business. 

Continue Reading
3 min read

Three Things to Look For to Identify Context Around an Attack Quicker

By Mike Davis, Vincas Čižiūnas, David Schertzer on May 29, 2020 2:36:17 PM

The cybersecurity industry has defined the term “attribution” of threat actors to refer to the identification of the specific actor or group of actors responsible for an attack. For many victims,  “attribution” as defined by the industry is unnecessary; understanding the ‘what’ and ‘how’ and returning to business as usual are much more important than knowing the ‘who’ behind the attack. 

Continue Reading
2 min read

Managed Intelligence: Four Factors for Building Adversarial Context

By Landon Winkelvoss on May 26, 2020 8:48:50 AM

With limited time and resources for a SOC to prioritize threats for additional research, Mars CISO Andrew Stanley gives several important factors when considering adversarial context with regard to the “who, how, and why” of attribution.

Continue Reading
3 min read

Managed Intelligence: Four Outcomes from Operationalizing Intelligence for Third-Party Risk Management

By Landon Winkelvoss on May 20, 2020 4:42:07 PM

Actionable intelligence is critical for third party risk management as it’s easy to chase false positives that waste resources. While automation enables timely response, deeper analysis is needed to make information from automated sources actionable. Zero touch diligence provides intuitive and actionable intelligence that matters for businesses assessing third-party risk by fusing robust analytic methodology with a suite of tools to collect, store, enrich, and integrate data from a wide variety of sources. Below are the four outcomes that result from thorough zero touch diligence efforts:

Continue Reading
2 min read

Three Areas of Focus For Your Insider Threat Program During the COVID-19 Crisis

By Mike Davis on May 18, 2020 11:57:00 AM

Security teams are settling in to the “new normal” of remote work as the COVID-19 crisis nears its third month here in the U.S. As many teams have discovered, among the myriad of logistical issues of a remote workforce is the increased risk insiders can cause cybersecurity incidents, even if mostly unintentionally. For many companies, the combination of required changes to network access policies and the human element of uncertainty around layoffs, furloughs, and salary reductions has created a need to quickly re-think the priority placed on insiders.  

Continue Reading
7 min read

Know Your Adversary: Russian APTs

By Vincas Čižiūnas on May 14, 2020 5:28:15 PM

In the previous two articles in this series, we examined the Iranian and Nigerian Advanced Persistent Threats (APTs) under a sociohistorical lens in order to better understand the various drivers that instigate their threat activity.  Today, we examine Russia under the same optic, to see if we can gain more insight than the traditional Technique, Tactic, and Procedure (TTP) game of whack-a-mole generally provides.

Continue Reading

Featured