The Cyber-Physical Threat Connection Demands Attention

On a daily basis companies experience minor and major cyber violations that range from phishing for individual login passwords to significant ransomware attacks that can disrupt entire industries. No matter what the level of cyber infraction, these are security issues hyper connected to physical threats. This cyber-physical linkage — and the large-scale potential business continuity…

Read More

How Companies Stop Insider Threats Before They Occur

Discover proactive strategies to prevent insider threats at the crucial intersection of security measures and human behavior. With insider threats on the rise (up 47% in the last two years), a thorough screening process has become imperative for any new hire. Expanding well beyond a simple ‘check-the-box task,’ screening demands a comprehensive process that uncovers…

Read More

How-To Guide: Assessing an Executive’s Digital Footprint

A key element involved in understanding the threats, vulnerabilities, and associated risk to an executive is the assessment of their digital footprint. The ultimate goal is to surface what information is available online for a savvy adversary to exploit. This information could range from details about the executive’s travel movements, satellite imagery of their home(s)…

Read More

What It Means to Be an Executive Protection Agent

The instinct to step forward and protect leaders when danger is on the horizon has been around since the beginning of mankind. It has evolved into the field of executive protection, or close protection, to keep corporate leaders and high-net-worth individuals and their families safe. In movies, we see agents wearing black suits, disrupting threats…

Read More

Gaining Deeper Insights Beyond Social Media Threat Intelligence

Social Media Threat Intelligence Hero Banner

When we zoom out and think about corporate threat assessment investigations holistically, it’s clear that social media threat intelligence plays a significant role — but how significant is it? In this article, we’d like to explore the benefits of using social media threat monitoring when conducting investigative research, as well as the pitfalls of relying…

Read More

Before the IPO: When to Think About Security

Most CEOs of companies undergoing an IPO don’t know what they need. Understand the holistic threat before buying security software and systems. When it comes to physical security systems and programs, many get sold a Cadillac when all they need is a Chevrolet, so work with a trusted vendor. Over the years, I’ve been asked…

Read More

What is Executive Protection? A Complete Introduction

Executive Protection (EP), also called Close Protection (CP) or executive personal protection, refers to private risk mitigation and security measures designed to ensure the safety of individuals (principals) and their families. Principals may require executive protection services due to higher personal risk related to their employment, geographic location, net worth, affiliations, or status. Classic attack…

Read More

When Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance

This article was originally featured on securityinformed.com. Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in…

Read More

Top 5 Security Analyst Interview Questions to Prepare For

When you are inspired to apply everything you learned in your university programs to protect people and assets, a Security Analyst position is a common starting point. It is also an area that companies plan to further invest in — in Ontic’s recent study on the State of Protective Intelligence, 66% of security leaders plan…

Read More