News

Employee Authored

How to Plan Your M&A Security Strategy – Authored by Landon Winkelvoss

Nisos Featured

Nisos The Cyber5 named one of 20 Best Information Security Management Podcasts of 2021

Employee Authored

Why Evaluating Cybersecurity Prior to Mergers and Acquisitions is Necessary – Authored by Landon Winkelvoss

Nisos Featured

Nisos named one of DCA Live’s 2021 RED HOT COMPANIES

Employee Authored

3 Steps to Disrupt Threat Actors Selling Access to Your Environment – Authored by Landon Winkelvoss

Employee Featured

Beware: Phone scammers are using this new sci-fi tool to fleece victims – Featuring Justin Zeefe

Employee Featured

Tips and tactics of today’s cybersecurity threat hunters – Featuring Willis McDonald

Employee Featured

NSI Experts Weigh In: President Biden’s Joint Address – Featuring David Etue

Employee Authored

Protecting What It Means To Be Human Online – Authored by David Etue

Infosec Report

Employee Featured

Q&A with David Etue, Chief Executive Officer at Nisos

Employee Featured

SolarWinds spurs investment in threat hunting, supplier vetting – Featuring David Etue

Employee Authored

Avoid source code leaks on third-party repositories – Authored by Landon Winkelvoss

Nisos Featured

Listen carefully: The growing threat of audio deepfake scams

Employees Featured

Legal recourse? Nissan balances competitive and security fallout from source code leak – Featuring Justin Zeefe and Jennifer DeTrani

Nisos Press Release

Managed Intelligence™ Provider Nisos Raises $6 Million to Counter Disinformation and Cyber Threats – Dated Jan 6, 2021

Employee Authored

On Detecting And Deterring Moles And Miscreants In The Workplace – Written by Jennifer DeTrani

Employee Authored

Hacker Diplomacy: Minimizing Business Risks Stemming From Vulnerability Disclosures – Written by Jennifer DeTrani

Employee Featured

Cybersecurity, Workplace Diversity & Lawyering Like a Human Being – Featuring Jennifer DeTrani

Nisos Featured

This is what a deepfake voice clone used in a failed fraud attempt sounds like – Featuring research by Nisos

Nisos Featured

Listen to This Deepfake Audio Impersonating a CEO in Brazen Fraud Attempt – Featuring research by Nisos

Employee Featured

EBay’s Critics Faced an Extreme Case of an Old Silicon Valley Habit – Featuring Justin Zeefe

Employee Authored

Short And Distort: How Companies Are ‘Bearing’ Down On Market-Shifting Disinformation – Written by Jennifer DeTrani

Employee Featured

Why Clark Howard Wants You to Set Up a ‘Financial Chromebook’ – Featuring Willis McDonald

Employee Authored

When Trademarks Attack: How To Detect And Disarm Doppelgänger Domains – Written by Jennifer DeTrani

Employee Featured

Security Weekly Interviews – Featuring Tyler Robinson

Nisos Featured

The Digital Economy of Disinformation on the Darknet: Controlling the Narrative – Featuring research by Nisos

Nisos Featured

Deepfakes Are Amazing. They’re Also Terrifying for Our Future.

Employee Authored

Analyzing Analytics (Featuring: The FBI)

Employee Authored

The Curious Case of Vincent Briatore

Employee Featured

American Steal Kremlin’s Playbook, for Clicks and Profit – Featuring Cindy Otis

Nisos Featured

How a Russian disinfo op got Trump impeached

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks