Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Technical Blogs

5 min read

Using Selectors For Open Source Intelligence

By Adam Gayde, Robert Raines, and Matthew Brock on Oct 20, 2020 10:12:23 AM

A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical blog defining a selector, we will be diving deeper into selectors and how they enable external threat hunting, attribution, and open source intelligence analysis.

Continue Reading
8 min read

The Myth of Complex Passwords

By Dev Badlu on Sep 16, 2020 11:06:03 AM

Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more importantly, provides the ability to move laterally in a network and escalate privileges, thus compromising critical data. 

Below is a deep dive into the art of passwords, and  how this can play out in both directions.

Continue Reading
7 min read

What is a Selector in the World of Digital Crime?

By Adam Gayde, Michael Eller, and Matthew Brock on Sep 9, 2020 9:36:30 AM

Every hour of every day, criminals, nation states, and fraudsters around the world commit attacks using phone numbers, email addresses, and social media handles. We call these “selectors,” i.e. the technical attributes of an online entity.

Continue Reading
4 min read

Five Critical Data Source Considerations for Adversary Attribution

By Jonathan Neuhaus & Adam Gayde on Aug 12, 2020 12:31:41 PM

Strong intelligence is the base of adversary attribution; nothing can replace the holistic picture created by technical indicators in combination with HUMINT and OSINT sources. 

Continue Reading

Cyber Diligence Provides Actionable Intelligence to M&A Teams

By Travis Peska, Vincas Čižiūnas, Jared Hudson on May 27, 2020 5:40:31 PM

Large companies take robust consultative approaches to integrating  networks and applications post-acquisition. Rarely do acquiring security teams have the resources or cost-effective internal processes to do their own investigative cyber diligence on a pending acquisition.  The most cost-effective option is intelligence analysis conducted “outside of the firewall”, analysis of unique data that combines automation and human investigation to provide timely and accurate insights  into key man risk, network security, negative press, and infrastructure and network vulnerabilities. Informed by this analysis, “on-network” compromise assessments can then provide a comprehensive inspection to enable the acquiring party to move forward confident it is on stable ground from a security perspective.

Continue Reading

Featured