Blog

In Democracy We Trust

In Democracy We Trust

In July 2020, enterprising PhD candidates and a Johns Hopkins professor began aggregating predictions of unrest in the United States into a site unsubtly titled “anewcivilwar.com”. At the time, it could have been easy to dismiss the effort as a cherry-picked exercise...

read more
Weaponization for Disinformation

Weaponization for Disinformation

Continuing our series on the adversarial mindset, we focus on how actors weaponize narratives for disinformation operations. In a previous blog post, we wrote about the reconnaissance steps that disinformation actors take prior to launching their operations, including...

read more
What is Coordinated Inauthentic Behavior?

What is Coordinated Inauthentic Behavior?

Coordinated Inauthentic Behavior (CIB) is a common phrase heard in the news regarding disinformation, misinformation, and influence operations; but what exactly does it mean?First, let’s define our terms: inauthentic behavior, and coordinated. Inauthentic behavior in...

read more
Weaponization for Cyber-Enabled Fraud

Weaponization for Cyber-Enabled Fraud

In our previous blog, we highlighted how fraudsters conduct reconnaissance for fraud activities. While banking malware, trojans, worms, and botnets such as Zeus Panda, Ramnit and Trickbot have typically been used to infect consumer PCs in order to collect personal...

read more
An Introduction to Honeypots

An Introduction to Honeypots

In our latest blog series, we discuss how threat intelligence can be applied smarter for medium sized organizations with limited resources. We discuss ways to proactively detect threats beyond subscribing to information feeds that require a lot of resources to...

read more
The Myth of Complex Passwords

The Myth of Complex Passwords

Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more importantly, provides the ability to...

read more
Avoiding Ransomware

Avoiding Ransomware

Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night. Ransomware is not a threat; it is a capability criminals use with an intent of monetizing illegal...

read more
Podcast Platitudes

Podcast Platitudes

Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes its consumers better at...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights Retainer℠
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks