Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

White Papers

Securing Linux Against Negligent or Malicious Administrators

By Willis McDonald & Vincas Čižiūnas on Apr 22, 2020 9:27:28 AM

Linux monitoring is deceptively difficult.  The most common tools for performing monitoring - the Linux audit system, log journals and syslog sources - are all, at best, standardized by Linux distribution, and at worst, unique per host in an enterprise environment.  File-based logging can be spoofed by intruders, while kernel-based subsystems have performance issues.  Many hosts will often be under low latency or high performance requirements, either due to cost saving measures on equipment, or due to an application that sees high utilization.There are few strong solutions today that don't leave gaping holes for intruders to achieve their low resource usage.

Continue Reading

Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce

By Bryan Clements & Chris DiSalle on Apr 10, 2020 2:26:46 PM

While the rapid shift from office to home or remote-based activity has allowed work to continue, the idea that corporate assets are physically leaving the corporate space, and with them access to proprietary or sensitive data, could be a disaster if your security policies and practices are not adapting to this new norm.  Now more than ever, companies need to be evaluating information technology and security practices surrounding insider threats.

Continue Reading

Insider Threat Indicators to Help Baseline an Insider Threat Program

By Nisos on Apr 6, 2020 4:14:05 PM

Insider Threats aren’t just individual malicious employees. They may be anyone who had or has privileged access to the environment. From the vendor partner to the totally unwitting employee, the impact is the same.

 

Download a list of threat indicators to help you determine who is a high risk to your company.

Continue Reading

Compromise Assessments: For Remote Workforce

By Chris DiSalle & Travis Peska on Apr 1, 2020 1:16:58 PM

Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce and subsequently monitoring for malicious activity of the increased attack surface.

Topics: Whitepapers
Continue Reading

Deep Fakes

By Rob Volkert on Apr 1, 2020 12:49:52 PM

This paper examines the illicit ecosystem for deep fakes.

Their technology evolution and migration paths from surface web to deep and dark sites, and uncover some of the actors creating and disseminating these videos. Nisos undertook research into deep fake technology (superimposing video footage of a face onto a source head and body) to determine if we could find the existence of a deep fake illicit digital underground economy or actors offering these services.

Continue Reading

Purple With a Purpose

By Nisos on Feb 16, 2020 8:47:00 PM

 

A true return on investment for network security

Topics: Whitepapers
Continue Reading
1 min read

Fake News Websites and a US-Macedonia Partnership

By Cindy Otis on Dec 1, 2019 8:54:00 PM

Fake News Websites and a US-Macedonia Partnership: A Fake News Case Study examines the fake news industry and specific attempts from bad actors to influence opinions. 

Topics: Whitepapers
Continue Reading

Featured