Our Blog

Check back for weekly updates

Risk and Reward – The Importance of Knowing the Network

The CISO’s role continues to evolve with the variables that change around them - ranging from the threat landscape, to the board of directors. These directly impact who targets you, who/what those attackers target to get access, and the resources you get to protect...

read more

Disinformation in the Time of Pandemics

So here we are, caught in the middle of a pandemic stemming from some failed chiroptera cuisine and aside from all of the normal daily activities, ones which a month and a half ago would have pulled me physically in several different directions and locations, I...

read more

Cybersecurity Diligence is Financial Diligence

Healthy deal flow that enables investment at a price point in line with an exit strategy is the foundation of the private equity business model. It is a given investors will conduct detailed diligence around a target’s financials, market, structure, and many other...

read more

Cybersecurity Diligence Doesn’t Need to be a Heavy Lift

Corporations large and small have always used acquisitions as a staple of their strategies to enter new markets, gain a competitive edge, and grow faster than they could organically. Similarly, private equity and venture capital firms have a prominent role in our...

read more

Deep Fakes

This paper examines the illicit ecosystem for deep fakes.Their technology evolution and migration paths from surface web to deep and dark sites, and uncover some of the actors creating and disseminating these videos. Nisos® undertook research into deep fake...

read more

Compromise Assessments: For Remote Workforce

Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce and subsequently monitoring for malicious activity of the increased attack surface.

read more

Know Your Adversary™: Iran

While researching advanced persistent threats (APTs), the common analytic angle has always been to identify malware and infrastructure techniques, tactics, and procedures (TTPs), and to develop detections. While this is effective for big player APTs such as Russia and...

read more

M&A Should Stand for “Mitigate, Not Avoid”

We’ve all read the horror stories over the past several years - the revelation of prior data breach in a target organization led to a massive decrease in the sale price, the unknown/unmitigated compromise led to a subsequent breach in the acquiring organization and...

read more

Cyber Hygiene for a Remote Workforce

With coronavirus gaining strength worldwide, a lot of companies are faced with something that they may have been avoiding: the prospect of a completely remote workforce. As is usually the case when situations are thrust upon a company, old mistakes come to light, new...

read more

Fake News Websites and a US-Macedonia Partnership

Fake News Websites and a US-Macedonia Partnership: A Fake News Case Study examines the fake news industry and specific attempts from bad actors to influence opinions. In brief, the study uses a recent case in the political arena, involving fake Macedonian news sites...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.