Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

News

The Disinformation Dilemma (Part II)

By External Author on Oct 3, 2019 12:00:00 PM

The number of countries in the cross-hairs of political disinformation campaigns more than doubled to 70 in the last two years, according to a recent report from researchers at Oxford University. Given the efficacy of such attacks, it’s not surprising that disinformation campaigns are also becoming a business problem. Companies as varied as Olive Garden, Koch’s Turkeys, and Columbine Chemicals have been recent victims of massive social media hoaxes spreading false information connected to their product or brand.

Topics: Cybersecurity
Continue Reading

The Disinformation Dilemma (Part I)

By Jennifer DeTrani, General Counsel of Nisos on Sep 19, 2019 1:30:00 PM

Disinformation attacks create the perfect storm on a global level by traversing hemispheres and social classes in a matter of moments.

Continue Reading

Disinformation Attacks Aren't Just Against Elections

By External Author on Aug 29, 2019 3:30:00 PM

While disinformation is getting a lot of attention in security circles, the discussion primarily tends to be in the context of election security. However, hacking social media accounts, or creating fake accounts, to post false messages about a company is absolutely a disinformation campaign.

Continue Reading
1 min read

Tyler Robinson from Nisos interview during Black Hat 2019

By External Author on Aug 14, 2019 2:00:00 PM

While the industry as a whole must adopt a more focused and holistic approach to working together as offense and defense. Without a true devotion from red team offensive groups to truly help and work together with the blue team defensive groups we will never see a shift and maturity in security as a whole.

Topics: Videos
Continue Reading

Spotting a Scam Account on Twitter

By External Author on Aug 14, 2019 2:00:00 PM

Meet Harrison. Harrison is “good, loving, caring, and kind hearted.” Harrison is also a fake account, though it might not look like it on first glance.

Topics: News
Continue Reading

How To Control Your Digital Footprint Without Losing Your Mind

By External Author on Jul 25, 2019 12:30:00 PM

Note that this is not a one-time exercise, but a digital hygiene process which should be rinsed and repeated at regular intervals.

Topics: News
Continue Reading

On The Fintech Carousel: Entering The Mobile Payments Space Requires Vision And Equilibrium

By External Author on Jul 11, 2019 1:00:00 PM

What lies ahead in fintech is a groundswell of rapidly and constantly developing regulatory requirements and unbridled opportunity.

Topics: News
Continue Reading

Strengthening The ‘Soft Underbelly’ Of Cybersecurity (Part II)

By External Author on Jun 27, 2019 2:00:00 PM

Attack simulations, physical security, social engineering, and open source intelligence assessments can help law firms learn and self-correct before a real hacker gets through first.

Topics: News
Continue Reading

Strengthening The ‘Soft Underbelly’ Of Cybersecurity (Part I)

By External Author on Jun 13, 2019 12:30:00 PM

Attack simulations, physical security, social engineering, and open source intelligence assessments can help law firms learn and self-correct before a real hacker gets through first.

Topics: News
Continue Reading

Improving Organizational Collaboration In Response To Cyber Attacks

By External Author on Mar 7, 2019 3:00:00 PM

A comprehensive security management program gives equal weight to external and internal threats. While outsiders may know more about the latest attack methods, insiders have intimate knowledge about the company which can lead to loss of sensitive data and wreak havoc on profits and market share. By moving from a reactive, ad hoc strategy for handling insider threats to a proactive, preventative, and coordinated approach, companies can minimize the financial and reputational impact of insider attacks — and someday maybe even prevent them altogether.

Topics: News
Continue Reading

Featured