9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security

There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still leaving security in the dark, pulling away funds for critical programs, team members, and technology.…

Read More

Minimizing IP Theft and Insider Threats During Times of Layoffs

This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…

Read More

The Real-Life Spy Behind the James Bond 007 Series

James Bond is one of the most legendary characters in film witnessed over the past several decades. In 1953 when the character of James Bond came to fruition in Ian Fleming’s novels under the code name 007, many were unaware that the inspiration for the character came from Serbian double agent, Duško Popov. Author Larry…

Read More

DHS Senior Medical Officer Shares Expertise on the Level of Medical Training Needed From Today’s Security Professionals

Training for failure versus success is game changing when it comes to responding to a worst-case scenario. However, today’s threat landscape has shown us that being prepared extends far beyond typical protection responsibilities. Basic medical training for security professionals is becoming more and more necessary to fulfill one’s duty of care. Dr. Alex Eastman is…

Read More

Beneath the Surface of Fraud, Corruption, and Compliance Risk Investigations

Identifying the most imminent threats are often far beneath what surfaces in the headlines. They take the expertise and perspectives of a team to ensure answers are sought collectively to minimize bias. This all-encompassing approach is especially important when dealing with cases involving fraud, corruption, and compliance risk. James Tunkey is the Chief Operating Officer…

Read More

Spotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo

Dr. Marisa Randazzo, PhD joins the podcast for a special round-up episode to celebrate the one-year mark on our Protective Intelligence Podcast series, Women Who Protect. This series spotlights women working in a wide range of positions within security, protection, and law enforcement. We’ve compiled highlights from some of our episodes featuring guests ranging from…

Read More

Red Teaming at Scale to Uncover Your Big Unknowns

This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…

Read More