Case Study

Data Driven Executive Protection

The Challenge Nisos was tasked to acquire additional information on a threat actor making violent threats against a big tech company’s executive leadership. Why Nisos The client understood Nisos employs analytic experts with years of threat mitigation expertise...

read more

Investigating a DDOS Attack

The Challenge A global consultancy (The Client) experienced network outages resulting from a large-scale Distributed Denial of Service (DDOS) attack against their Domain Name Service (DNS) servers. Why Nisos The Client engaged Nisos to leverage our access to external...

read more

Cyber Diligence: Critical for M&A

The Challenge A private equity company (the client) focusing on mid-size businesses acquired an e-commerce platform (the portfolio company), and during the post-acquisition period learned of a breach affecting the company’s public-facing application server. An...

read more

Eight Hours to Attribution

The Challenge A multinational manufacturer (The Client) came to Nisos for help responding to an unusual incident. An unauthorized user opened a trouble ticket in the Client’s internal IT ticketing system. In the ticket, the actor demonstrated access to sensitive...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights Retainer℠
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks