CISO Global announced that it is expanding its capabilities by deepening its threat intelligence feed and incorporating it into existing services. Named 'Threat Informed', this new data stream mines the DarkNet, an overlay of secret networks comprised of communication channels that can only be accessed with specific software and processes used mostly by malicious hackers, to identify cybersecurity threat intelligence that is otherwise difficult to find and/or discuss. Leveraging proprietary DarkNet technology and other intellectual property, CISO Global executes its own real-time, continuous DarkNet searches, validating the security of its clients to ensure they have not been compromised.

Whereas many threat feeds retain outdated information, CISO uses a proprietary methodology to verify that its threat feed is current and to ensure relevance and accuracy. Cyber adversaries heavily rely on stolen or compromised login credentials due to their relative ease of accessibility. Since threat actors often seek the path of least resistance, this route involves the exploitation of illicitly acquired login details.

According to the 2023 Verizon Data Breach Investigations Report, stolen or compromised login information is the underlying cause of more than 50% of all security breaches. Threat Informed is part of CISO Global's ongoing effort to innovate new ways to better protect its client base of 1,100 organizations spanning the financial, healthcare, retail and IT sectors. Finding new sources of threat information in the wild enables CISO Global to mine and correlate data to lessen cyber risks for customers.

This strategy is proving to be successful given the rate of compromise among CISO Global's clients prior to their utilization of its services. This development comes on the heels of two other recently launched solutions, ARGO Edge, a cloud-first security solution designed from the ground up to protect an organization's users no matter where they are, along with CheckLIGHT(R), a platform that utilizes continuous scanning to identify unauthorized processes associated with fraudulent phishing attacks, hacking, imposter scams, malware, ransomware and viruses. Actively learning host systems, CheckLIGHT(R) also studies new viruses it encounters, developing unique defenses to protect the network and its users through next-generation signature, behavior and machine learning algorithms.