What happens when executive protection goes wrong?

At its most basic, executive protection – or close protection – is a mitigative effort aimed at enhancing a principal’s safety. Done correctly, it can greatly deter potential threats from causing harm. Done incorrectly, and the consequences could be fatal.   Executive protection is more nuanced than you think. Despite a few, basic similarities, executive…

Read More

Intelligence Failures: What are they and how do they happen?

Intelligence failures that make the news are uncommon. But when they do, they’re usually the result of something severe. What can cause a breakdown in intelligence so tremendous that it makes headlines the world over? It’s the direct result of an organization’s inability to perceive that something so calamitous could happen on their watch, and…

Read More

The Changing Environment’s Impact on Security

Stories on the destructive impact of climate change regularly make headlines throughout the weekly news cycle. It’s no surprise as to why; droughts are becoming more common, forest fires have increased steadily since the 1980s, and major storms are three times as frequent as they were a century ago. What do these oscillations in environmental…

Read More

Workplace Violence Prevention

Most people have a specific image in mind when they hear the term “security risk.” Some think of a hardened criminal, or a disgruntled insider. Others picture a faceless hacker in an unmarked building, peddling out lines of code to infiltrate bank accounts. But rarely does anybody consider one of the most recurrent threats facing…

Read More

Four Essential Steps to Managing Modern Security

The Security Management Cycle Nearly every modern security framework can be broken down into four, distinct phases: Intelligence, Protection, Response, and Recovery. Each function as a failsafe for the one beforeit, so in a sense, managing security means managing failure. For example, if an organization falls short on responding to a threat, it should be…

Read More

Deepfake Technology and its Perils

In late January 2024, social media users and internet denizens were greeted with shocking images depicting pop idol Taylor Swift engaged in sexually explicit acts. These compromising photos were quickly flagged, but as with all things on the Web, once they’re out, they’re out. Before Meta and X were able to filter the content, millions…

Read More

Insider Threats: Identification, Detection and Protection

What are insider threats? Nothing has the potential to unravel a company’s hard work and success quite like an insider threat. Insider threats are any vulnerabilities that exist as a byproduct of human factors originating from within an organization. According to many authorities on the subject, including the U.S. Government’s Cybersecurity and infrastructure Security Agency,…

Read More

Tourism Security: Aruba’s Bike Patrol

The Aruba Effect Post pandemic, vacationers are ready to make up for lost time, and tropical paradises like Aruba are seeing the surge. Aruba has always been one of those idyllic locations everyone raves about, but in recent years, the country’s tourism numbers have soared to heights few analysts could have predicted. Locals have taken…

Read More