Corporate security and executive protection teams have a big job. Threats to key personnel are ever-present and increasingly originate online…
Executive Shield
How Do Cybercriminals Steal Credentials?
Cybercriminals have access to billions of email and password combinations on the dark web. There are many ways user credentials can end up being auctioned off…
Why Physical Security and Cybersecurity Must Work Together
As more and more aspects of business move into the digital world, the internet provides many conveniences and opportunities to increase productivity…
Digital Executive Protection: Your Physical Security is Gone, Now What?
Executive protection teams face the unenviable job of triaging daily threat posts coming from many directions, including social media, phone calls, emails, and even in person…
Reducing Executive Risk by Removing Sensitive Personally Identifiable Information (PII) from the Internet
The ChallengeA technology company tasked Nisos to conduct a threat evaluation assessment on one of their executives after multiple internet forum users posted inflammatory, threatening, and racially derogatory content.More concerning, some forum users posted the...
Data Driven Executive Protection
The Challenge Nisos was tasked to acquire additional information on a threat actor making violent threats against a big tech company’s executive leadership. Why Nisos The client understood Nisos employs analytic experts with years of threat mitigation expertise...
Using Data for Market Entry of Product and Services Based on Security Incidents
The Challenge A global consumer service provider (the Client) was exploring different foreign cities to launch their new service, using security and safety as a critical metric. Why Nisos Nisos was tasked with identifying geographic and temporal crime patterns within...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.