Featured Content

Video Library

Recorded Webinar Series, Webcasts, and Explainer Videos

 

News

Insights and commentary on things happening in the world of managed intelligence

Podcast

Weekly segments for The Cyber5 and Know Your Adversary Podcasts

 

Resource Library

Case Study

Eight Hours to Attribution 

Case Study

Cyber Diligence: Critical for M&A 

Case Study

Investigating a DDOS Attack 

Case Study

Reducing Executive Risk

 

Case Study

Data Driven Executive Protection

 

Case Study

Attributing E-Crime Syndicates Adds Critical Context

Case Study

Threat Intel to Remediate Platform Abuse

Case Study

Countering Destruction to Save a Business

Case Study

Preventing Corporate Sabotage by a High-Level Executive

Case Study

Preventing the Exfiltration of PII from a Malicious Administrator

Case Study

Mergers, Acquisitions, and Hidden Threats

Case Study

Malicious Insider Leaking Information to Unauthorized Third Parties

Case Study

Investigating a Destructive Administrator Following Merger and Acquisition

Case Study

Actively Countering Advanced Persistent Threats with External Telemetry

Case Study

Investigating Nation-State Espionage and Theft of Intellectual Property

Case Study

Mitigating Advanced Threat Actors Acquiring and Analyzing Malicious Tools to Stop Fraud

Case Study

Gaining Access to Closed Groups to Gain Insight into Vulnerability Disclosure and Further Litigation

Case Study

Using Data for Market Entry of Product and Services Based on Security Incidents

Case Study

DDOS Investigation Leads to Much Greater Network Security Bolstering

Case Study

Third Party Risk Management Investigating a Leak of Sensitive Data

Case Study

Monitoring Geopolitical Sentiment and Physical Threats During COVID-19

Case Study

External Hygiene Assessment Delivers Valuable Insight Prior to Company Acquisition

Case Study

Disrupting Nation-State Recruiting and Disinformation Efforts on Job Site Platform

Case Study

Attributing Short Sellers to Increase Confidence in Corporate Governance

Case Study

Countering APTs, Ensuring M&A Standards through Threat Hunting

Case Study

Online Indicators and Warning Enables Business

Case Study

Insider Threat: Preventing Destruction During M&A Activity

Case Study

Identifying and Disrupting Platform Abuse in the Gig-Economy

h

Service Brief

Adversary Insights Retainer℠

h

Service Brief

Event-Driven Intel Investigations

h

Service Brief

Intelligence Team as a Service – Corporate Security

h

Service Brief

Intelligence Team as a Service – Cyber Defense

h

Service Brief

Investment Zero Touch Diligence

h

Service Brief

Third-Party Risk Management Zero Touch Diligence

h

Service Brief

On Demand Threat Research

h

Solution Brief

Executive Shield for Corporate Security 

N

Customer Outcome

3 Hours to Attribution

p

About Nisos

Company Overview

p

About Nisos

Social Media Monitoring and Analysis Capability

p

About Nisos

Nisos Intelligence Database Capability

i

White Paper

Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce

i

White Paper

Full Cyber Diligence Capabilities Can Provide Actionable Intelligence to M&A Deal Teams

i

White Paper

Deep Fakes: Understanding the Illicit Economy for Synthetic Media

i

White Paper

Fake News Websites and a US-Macedonia Partnership

i

White Paper

Compromise Assessments: For the Remote Workforce

i

White Paper

Managed Intelligence: Shaping a Threat Hunt Program

i

White Paper

Leveraging Technical Expertise & Data Partnerships to Combat Disinformation

i

White Paper

Zero Touch Diligence Actionable Intelligence for Third-Party Risk Management

i

White Paper

Common Network Segmentation Strategies for Production Environments

i

White Paper

Real Cyber Threat Intelligence Tells a SOC What Its Security Cannot Detect

i

White Paper

Securing Linux Against Negligent or Malicious Administrators

i

White Paper

An Overview on Signature and Personality-Based Attributions to Mitigate Risk for the Business

i

White Paper

Transitioning Cyber Threat Information to Actionable Threat Intelligence Provides Critical…

Advice & Tips

Insider Threat Indicators to Help Baseline an Insider Threat Program

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights Retainer℠
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks