Featured Content

Video Library
Recorded Webinar Series, Webcasts, and Explainer Videos

News
Insights and commentary on things happening in the world of managed intelligence

Podcast
Weekly segments for The Cyber5 and Know Your Adversary Podcasts
Resource Library

Case Study
Eight Hours to Attribution

Case Study
Cyber Diligence: Critical for M&A

Case Study
Investigating a DDOS Attack

Case Study
Reducing Executive Risk

Case Study
Data Driven Executive Protection

Case Study
Attributing E-Crime Syndicates Adds Critical Context

Case Study
Threat Intel to Remediate Platform Abuse

Case Study
Countering Destruction to Save a Business

Case Study
Preventing Corporate Sabotage by a High-Level Executive

Case Study
Preventing the Exfiltration of PII from a Malicious Administrator

Case Study
Mergers, Acquisitions, and Hidden Threats

Case Study
Malicious Insider Leaking Information to Unauthorized Third Parties

Case Study
Investigating a Destructive Administrator Following Merger and Acquisition

Case Study
Actively Countering Advanced Persistent Threats with External Telemetry

Case Study
Investigating Nation-State Espionage and Theft of Intellectual Property

Case Study
Mitigating Advanced Threat Actors Acquiring and Analyzing Malicious Tools to Stop Fraud

Case Study
Gaining Access to Closed Groups to Gain Insight into Vulnerability Disclosure and Further Litigation

Case Study
Using Data for Market Entry of Product and Services Based on Security Incidents

Case Study
DDOS Investigation Leads to Much Greater Network Security Bolstering

Case Study
Third Party Risk Management Investigating a Leak of Sensitive Data

Case Study
Monitoring Geopolitical Sentiment and Physical Threats During COVID-19

Case Study
External Hygiene Assessment Delivers Valuable Insight Prior to Company Acquisition

Case Study
Disrupting Nation-State Recruiting and Disinformation Efforts on Job Site Platform

Case Study
Attributing Short Sellers to Increase Confidence in Corporate Governance

Case Study
Countering APTs, Ensuring M&A Standards through Threat Hunting

Case Study
Online Indicators and Warning Enables Business

Case Study
Insider Threat: Preventing Destruction During M&A Activity

Case Study
Identifying and Disrupting Platform Abuse in the Gig-Economy

Service Brief
Adversary Insights Retainer℠

Service Brief
Event-Driven Intel Investigations

Service Brief
Intelligence Team as a Service – Corporate Security

Service Brief
Intelligence Team as a Service – Cyber Defense

Service Brief
Investment Zero Touch Diligence

Service Brief
Third-Party Risk Management Zero Touch Diligence

Service Brief
On Demand Threat Research

Solution Brief
Executive Shield for Corporate Security

About Nisos
Company Overview

About Nisos
Social Media Monitoring and Analysis Capability

About Nisos
Nisos Intelligence Database Capability

White Paper
Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce

White Paper
Full Cyber Diligence Capabilities Can Provide Actionable Intelligence to M&A Deal Teams

White Paper
Deep Fakes: Understanding the Illicit Economy for Synthetic Media

White Paper
Fake News Websites and a US-Macedonia Partnership

White Paper
Compromise Assessments: For the Remote Workforce

White Paper
Managed Intelligence: Shaping a Threat Hunt Program

White Paper
Leveraging Technical Expertise & Data Partnerships to Combat Disinformation

White Paper
Zero Touch Diligence Actionable Intelligence for Third-Party Risk Management

White Paper
Common Network Segmentation Strategies for Production Environments

White Paper
Real Cyber Threat Intelligence Tells a SOC What Its Security Cannot Detect

White Paper
Securing Linux Against Negligent or Malicious Administrators

White Paper
An Overview on Signature and Personality-Based Attributions to Mitigate Risk for the Business

White Paper
Transitioning Cyber Threat Information to Actionable Threat Intelligence Provides Critical…

Advice & Tips
Insider Threat Indicators to Help Baseline an Insider Threat Program