Deepfake Technology and its Perils

In late January 2024, social media users and internet denizens were greeted with shocking images depicting pop idol Taylor Swift engaged in sexually explicit acts. These compromising photos were quickly…

Read More

Become a TRV Wizard

Over the past few years, we have been asked provide Threat, Risk and Vulnerability Assessments for many clients at locations across the globe.  These clients range from academic institutions, mass…

Read More

Museum Guards Decide

Our ability to mitigate threat is built on awareness, it’s the first important step for detection which then leads to deterrence and deployment. It seems obvious that those who are…

Read More

Benchmarking Security Assessments

Ask three people: is the security here good? and you’ll get four different answers.  Our notions about security tend to be qualitative.  Sure, if a security system was recently breached…

Read More

Transit Insecurity

Violent crime on city streets and around transit hubs are in the news every day. A little old lady gets punched in the face at a bus stop, someone is…

Read More

Duty to Protect

To what extent is a business obligated to provide security for its customers?  And to what extent does security influence which businesses a customer choses to frequent?  These questions are…

Read More

Officer Joe’s on Post

The security industry has some unique characteristics which influence its management.  What works just fine for management in other business sectors does not work well in security. As background, decades…

Read More