Corporate Security
Deepfake Technology and its Perils
In late January 2024, social media users and internet denizens were greeted with shocking images depicting pop idol Taylor Swift engaged in sexually explicit acts. These compromising photos were quickly…
Read MoreInsider Threats: Identification, Detection and Protection
What are insider threats? Nothing has the potential to unravel a company’s hard work and success quite like an insider threat. Insider threats are any vulnerabilities that exist as a…
Read MoreTourism Security: Aruba’s Bike Patrol
The Aruba Effect Post pandemic, vacationers are ready to make up for lost time, and tropical paradises like Aruba are seeing the surge. Aruba has always been one of those…
Read MoreSecurity Challenges to Operational Technology in a Connected World
Operational Technology Networks are becoming more complex by the day, as they integrate new, emerging connection technologies with capabilities that reach far beyond those of personal computers and servers. These…
Read MoreBecome a TRV Wizard
Over the past few years, we have been asked provide Threat, Risk and Vulnerability Assessments for many clients at locations across the globe. These clients range from academic institutions, mass…
Read MoreMuseum Guards Decide
Our ability to mitigate threat is built on awareness, it’s the first important step for detection which then leads to deterrence and deployment. It seems obvious that those who are…
Read MoreBenchmarking Security Assessments
Ask three people: is the security here good? and you’ll get four different answers. Our notions about security tend to be qualitative. Sure, if a security system was recently breached…
Read MoreTransit Insecurity
Violent crime on city streets and around transit hubs are in the news every day. A little old lady gets punched in the face at a bus stop, someone is…
Read MoreDuty to Protect
To what extent is a business obligated to provide security for its customers? And to what extent does security influence which businesses a customer choses to frequent? These questions are…
Read MoreOfficer Joe’s on Post
The security industry has some unique characteristics which influence its management. What works just fine for management in other business sectors does not work well in security. As background, decades…
Read More