Posts by Chameleon
The Changing Environment’s Impact on Security
Stories on the destructive impact of climate change regularly make headlines throughout the weekly news cycle. It’s no surprise as to why; droughts are becoming more common, forest fires have…
Read MoreFive Reasons Why You Need Threat, Risk, and Vulnerability Assessment Training
What is a threat, risk, and vulnerability assessment? A threat, risk, and vulnerability assessment – also known as a TRVA – provides a snapshot of an organization’s security conditions…
Read MoreWorkplace Violence Prevention
Most people have a specific image in mind when they hear the term “security risk.” Some think of a hardened criminal, or a disgruntled insider. Others picture a faceless hacker…
Read MoreFour Essential Steps to Managing Modern Security
The Security Management Cycle Nearly every modern security framework can be broken down into four, distinct phases: Intelligence, Protection, Response, and Recovery. Each function as a failsafe for the one…
Read MoreDeepfake Technology and its Perils
In late January 2024, social media users and internet denizens were greeted with shocking images depicting pop idol Taylor Swift engaged in sexually explicit acts. These compromising photos were quickly…
Read MoreBlack History Month: Honoring Women of Color and their Contributions to Security
Black History Month is a time for Americans to honor people of color, celebrating their role in everything ranging from arts and culture to science and technology. The pool of…
Read MoreInsider Threats: Identification, Detection and Protection
What are insider threats? Nothing has the potential to unravel a company’s hard work and success quite like an insider threat. Insider threats are any vulnerabilities that exist as a…
Read MoreTourism Security: Aruba’s Bike Patrol
The Aruba Effect Post pandemic, vacationers are ready to make up for lost time, and tropical paradises like Aruba are seeing the surge. Aruba has always been one of those…
Read MoreSecurity Challenges to Operational Technology in a Connected World
Operational Technology Networks are becoming more complex by the day, as they integrate new, emerging connection technologies with capabilities that reach far beyond those of personal computers and servers. These…
Read MoreBecome a TRV Wizard
Over the past few years, we have been asked provide Threat, Risk and Vulnerability Assessments for many clients at locations across the globe. These clients range from academic institutions, mass…
Read More