3 Questions to Understand and Analyze Any Threat

No successful team strategizes to win without evaluating who they’re up against. The same goes for security — a program has little chance of success without logically evaluating the risks or assessing the threat(s) at hand. Understanding the Threat The first foundational principle of an effective security program is to understand the threat, which should…

Read More

Gaining Deeper Insights Beyond Social Media Threat Intelligence

Social Media Threat Intelligence Hero Banner

When we zoom out and think about corporate threat assessment investigations holistically, it’s clear that social media threat intelligence plays a significant role — but how significant is it? In this article, we’d like to explore the benefits of using social media threat monitoring when conducting investigative research, as well as the pitfalls of relying…

Read More

How to Identify Those Who Pose a Threat From Those Who Make a Threat

Searching for threats that are made with violent intent from the thousands of threats that are made every day can often amount to searching for a needle in a haystack. Limited resources mean that threat assessors must be able to identify the factors and warning signs of a potentially serious risk without escalating non-threatening concerns.…

Read More

Wrong Place Wrong Time: Protective Intelligence While Working Overseas

Understanding global protective intelligence risks is essential to understanding your overall global threat assessment. Knowing who may be “dragging” a threat to your meeting is critical. Nation-State intelligence services exist to steal secrets — even yours.  It’s no secret that the world is a dangerous place. Organizations with international operations and executives traveling abroad face…

Read More

Understanding the Hostile Planning Process to Establish a More Powerful Security Position

In this episode, Fred and Ami Toben discuss the hostile planning process and how to isolate and target vulnerabilities in order to prevent it from getting to the execution phase. They also discuss the finer points of detection and observation as well as the available training from HighCom Security including hostile activity prevention, executive protection,…

Read More