Our Blog

Check back for weekly updates

What Are Bots and How Are They Used?

What Are Bots and How Are They Used?

A bot is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user needing to manually start them up every time. Bots often imitate or replace a human user's behavior...

read more
Nisos Wins 2 Global Infosec Awards

Nisos Wins 2 Global Infosec Awards

The 9th annual Global InfoSec Awards found the most innovative, forward-thinking, and proactive cyber security companies who manage, create, and offer the most respected information security products and services. The awards, granted by Cyber Defense Magazine (CDM),...

read more
Careful What You Wish For: The NewProfilePic App

Careful What You Wish For: The NewProfilePic App

Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app. “It really brings out the best in you!” they say. Then, one day, the buzz takes a turn - “You haven’t heard? The Newprofilepic app is Russian and sends...

read more
What Is Threat Intelligence?

What Is Threat Intelligence?

Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat. This data is collected, correlated, processed, analyzed, and used to assess...

read more
How Do Cybercriminals Steal Credentials?

How Do Cybercriminals Steal Credentials?

Cybercriminals have access to billions of email and password combinations on the dark web. There are many ways user credentials can end up being auctioned off on the black market. Finding out that your users’ credentials have been leaked is anxiety-producing, to say...

read more
5 Signs You Need an Enterprise Cyber Fusion Center

5 Signs You Need an Enterprise Cyber Fusion Center

The concept of a fusion center originated in response to the intelligence-sharing challenges of the war on terror. Typically state-owned and operated, a fusion center distributes threat-related information between state, local, tribal, federal, and private sector...

read more
Russian Aggression and Its Potential Impact on the West

Russian Aggression and Its Potential Impact on the West

History and current intelligence indicate Russia’s strategic objective is to install a puppet regime in Kyiv favoring Moscow. These actions echo previous Russian activity in Belarus and Kazakhstan and will help to limit the perceived threat of NATO expansion.  Current...

read more
Domain Abuse: What to Look For and Monitor

Domain Abuse: What to Look For and Monitor

Let’s say that you have just signed up for a new subscription to a software program. You’re new to the company and service and learning the ropes of this new program. As you are getting started, your email inbox pings with a new email alert. You open it, and it...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.