A Changing U.S. Threat Environment

For decades, organizations in the United States have been accustomed to looking outward for threats. Prevention efforts were focused mostly on bad guys coming from outside the organization to attack “us.” Was the attack of the US Capitol a wake-up call to alert us that perhaps our focus should change, and to give more attention…

Read More

Stay Ahead of the Threat

On September 11, 2001, every U.S. airline met the security requirements set by the government.  Adherence to regulations did nothing to prevent the attacks of that day. Many corporate and government security administrators make the mistake of building their security system and its requirements only around past events, against those methods of operation that have…

Read More

Become a TRV Wizard

Over the past few years, we have been asked provide Threat, Risk and Vulnerability Assessments for many clients at locations across the globe.  These clients range from academic institutions, mass transit agencies, government facilities and corporate offices. Our approach to TRVs is based on a particular methodology.  Methodologies by definition are applicable to any environment…

Read More

The Method to the Madness of Criminal Intent

Late in the summer of 2015, open source news reporting indicated that Chinese hackers may have been to blame for the breach of information at USIS, which is the major U.S. contractor for security background investigations for the U.S. Government. Initial estimates indicate that the cyber security hacking included more than 25,000 private records. Investigators…

Read More

Kardashian Caper

When we do threat assessments for high net worth clients they include looking at physical layouts of all locations, best use of technology, transit routes and procedures, security SOPs and staff backgrounds.  We also always do a thorough hunt through social media and open internet sources.  These provide a treasure trove of information that any…

Read More

Threats from Insiders

Insider threats are among an organization’s biggest security challenges. Consider three recent events: In February 2010, a 47-year old female professor at the University of Alabama at Huntsville killed three colleagues and wounded three others in a shooting rampage at a biology department staff meeting. In September 2014, a communications contractor set fire to an…

Read More