The Cyber5 Podcast

Defining Selectors in the World of Digital Crime by Nisos’ Adam Gayde, Robert Raines, and Matthew Brock

Episode 27 of the podcast with Nisos experts Adam Gayde, Matt Brock, and Robert Raines discusses the meaning and importance of selectors in the world of digital crime. Learn more about how knowing an IP address, email address, or social media handle can help improve network and platform defense.


  • (00:40) Question 1: In the world of digital crime, what do you define as a selector?
  • (08:02) Question 2: What are the importance of these selectors from an analytical perspective? What are the properties and values of various kinds of selectors?
  • (11:38) Question 3: How do you grade the value of a selector and what are some investigative use cases.
  • (18:56) Question 4: From a data engineering perspective, how should we think about aggregating data that allows analysts to query for selectors of interest?
  • (29:31) Question 5: What business problems do you solve through these definitions and how are selectors evaluated in the process?

Episode 27 | October 8, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks