Dangerous Admirers: How to Protect Public Figures From Harassers As Legal Protections Are in Jeopardy
In 2010, country-music singer Coles Whalen began receiving messages from a fan on her Facebook account. While Ms. Whalen ignored the relatively benign messages at first, the fan kept sending her messages—thousands over the course of several years. The fan praised her talents but also alluded to following her and knowing the whereabouts of her…
Read MoreFrom Coronations to Corporations: The Hidden Nuts and Bolts of Major Event Security Planning
This article was originally featured on IFSEC Insider When Queen Elizabeth was crowned in June 1953, the procession of dignitaries that followed numbered 16,000 people. It took the procession approximately 45 minutes to pass any one point along the route. When she died nearly 70 years later, London’s Metropolitan Police Service said her funeral was…
Read MorePerspectives on the Shinzo Abe Assassination
Download this whitepaper to help your organization understand:
Read More2022 Mid-Year Outlook State of Protective Intelligence Report
Ontic surveyed 400 executives across four different departments at U.S. enterprises who have responsibilities for protecting businesses: physical security, cybersecurity and IT, human resources, and legal and compliance. Download the report to gain new insights into:
Read MoreTaking Sides: Securing Executives and Operations Amid Unrest
The tempo of protective security concerns since the 2020 election have been relentless. Threats have been non-stop since the 2020 election, followed by the January 6th storming of the U.S. Capitol, the D.C. bomber on the run, compounded by protests related to the pandemic, social justice issues and economic unrest. The leaked Supreme Court memo…
Read MorePhysical and Digital Executive Protection: Synchronizing Domains
Exploring the relationship between executive cyber protection and physical security teams and some strategies to achieve these goals. Organizations of all sizes continue to face risks from multiple vectors in the digital and physical domains. These domains overlap, and for at least half a decade, organizations have quietly discussed ways to converge these functions. The…
Read MoreThe 2022 State of Protective Intelligence Report
Download the report for insights on:
Read MoreApplying Security Trainings in Real Life: How Preparing for Hostage Situations Saves Lives
One of the first lessons I learned as a young member of the rescue squad is that training saves lives. Stopping the bleeding, CPR, protection from smoke inhalation and other training we practiced saved lives every day. Later, as a police officer and special agent, that mindset was consistently reinforced in different situations, but especially…
Read MoreStudy Finds Increase in Cybersecurity and Physical Security Attacks Against Executives
In the art of protective and tactical intelligence, trends and analytics matter. Information and intelligence feed “living” threat assessments and should drive your cybersecurity and physical security strategy, coverages, and resources. Protection resources cannot be logically allocated to protect executives and companies without first understanding the holistic threat landscape. In the executive protection security space,…
Read MoreExecutive Targeting: Analysis into the Protection of Corporate Business Leaders
In this research study, you will learn about:
Read MoreOf Kidnappings, Lions, and Crocodiles
The October 16 kidnapping of 17 expatriate missionaries in Haiti has generated a great deal of press attention. Among the victims were 16 American citizens and one Canadian. The group is comprised of five men, seven women, and five children—including a toddler. The gang that conducted the abduction, 400 Mawozo, is no stranger to kidnapping.…
Read MoreExecutive Risks Intensified Throughout Pandemic, Study Finds
This article was originally featured in ASIS Security Management. The scenic neighborhood of Pleasure Point Drive in Santa Cruz, California, was shockingly disrupted in the early hours of 1 October 2019 when Tushar Atre was dragged from his home by three assailants. By 9:00 a.m., the namesake and then-CEO of tech company Atrenet was found…
Read More
2021 Mid-Year Outlook
State of Protective
Intelligence Report
Download the report for insights on:
Read MoreConsiderations for Personal Safety and Small Office Protection
Not all organizations have large security teams observing and protecting employees and their customers during their day-to-day operations. Small office environments who lack the resources for security staff are often left scrambling when something doesn’t feel right, or, conversely, overreact when presented with an unwanted situation. However, employees and business owners working at organizations of…
Read MoreWhen Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance
This article was originally featured on securityinformed.com. Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in…
Read MoreThe 2021 State of Protective Intelligence Report
Download the report for insights on:
Read More