Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

Services Overview

Insider Threat Webinar

Getting Inside Insider Threats: Response and Mitigation. Stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft.

Case Studies

Case Study: Countering APTs, Ensuring M&A Standards Through Threat Hunting

By Nisos on Apr 9, 2020 8:27:49 PM

A global retailer’s peers were attacked with customized ransomware and the retailer’s subsidiaries were being targeted with customized phishing attempts. Out of concern that a subsidiary could be targeted by a similar ransomware attack, Nisos was contacted to assist. 

 

Continue Reading

Case Study: Investigating a DDOS Attack

By Nisos on Apr 9, 2020 7:30:00 PM

A global consultancy experienced network outages resulting from a large-scale Distributed Denial of Service (DDOS) attack against their Domain Name Service (DNS) servers. Nisos was engaged to leverage access to external telemetry and analytic expertise in order to determine if the consultancy was specifically targeted by the DDOS attack and to perform potential attribution of the threat actors and attack sources.

Continue Reading

Case Study: Third Party Risk Management, Investigating a Leak of Sensitive Data from a Customer

By Nisos on Apr 8, 2020 4:55:59 PM

A global data and infrastructure provider determined a very tightly controlled database was for sale on the dark web. The Client discovered this database was being sold on criminal forums and needed to attribute the seller and the source of the leak.

Continue Reading

Case Study: Insider Threat, Preventing Destruction During M&A

By Nisos on Apr 8, 2020 4:45:12 PM

A global technology company was in the process of divesting a previous acquisition. Upon learning of the divestiture plan , the key executives at the acquisition company threatened to destroy corporate infrastructure if the company was not sold back to the original founders at a lower price.

Continue Reading

Case Study: Threat Intelligence to Remediate Platform Abuse

By Nisos on Apr 8, 2020 3:48:21 PM

A publicly traded technology company with thousands of global employees maintains a premier business unit application platform regularly abused by eCrime and cyber espionage actors.

Topics: Cybersecurity
Continue Reading

Case Study: Actively Countering Advanced Persistent Threats with External Telemetry

By Nisos on Apr 7, 2020 9:48:40 PM

A technology company with thousands of employees across the globe was under attack by a nation-state level adversary. They requested Nisos’ assistance to provide critical intelligence to detect indicators and respond to the attack.

Continue Reading

Case Study: Cyber Diligence, Critical for M&A

By Nisos on Apr 7, 2020 9:09:36 PM

A private equity company focusing on mid-size businesses acquired an e-commerce platform, and during the post-acquisition period learned of a breach affecting the company’s public-facing application server.

Continue Reading

Case Study: Eight Hours to Attribution

By Nisos on Apr 2, 2020 9:16:57 AM

A multinational manufacturer (The Client) came to Nisos for help responding to an unusual incident. An unauthorized user opened a trouble ticket in the Client’s internal IT ticketing system. In the ticket, the actor demonstrated access to sensitive client resources and associated the ticket with a senior IT security executive.

Topics: Case Study
Continue Reading

Case Study: Mergers, Acquisitions & Hidden Threats

By Nisos on Dec 3, 2019 9:08:00 PM

Executing a successful merger or acquisition is a major undertaking. There are countless details to be managed by a multitude of stakeholders against fast-approaching deadlines. Strategic issues including financials, employment, tax, and technology must all be considered within the scope of regulatory and integration considerations to ensure the smooth unification of distinct entities. 

Topics: Case Study
Continue Reading

Featured