-
Why is Protective Intelligence Effective?
Read moreAction is always faster than reaction. Therefore, the advantage will be with the security team who can prevent an incident…
-
Cyber Threats Part 4: Ransomware Attacks
Read moreThe fourth in a five-part cyber threat series focuses on ransomware attacks where information or computer networks are held hostage…
-
Protecting Yourself From Mass Public Shootings
Read moreMost of the material I have produced on personal security, such as articles discussing how to practice situational awareness, counter…
-
Cyber Threats Part 3: Business Email Compromise
Read moreThe third in a five-part series demystifies business email compromise schemes and how they target those who transfer funds electronically.…
-
Cyber Threats Part 2: Phishing and Spear Phishing Attacks
Read moreThe second in a five-part series explores phishing, and the more targeted spear phishing attack, and how they manipulate information…
-
Cyber Threats Part 1: Understanding the Cyber Attack Cycle
Read moreCyber attacks leverage information to gain access to proprietary networks, electronic devices, and chains of command in order to gain…
-
Security: The Great Enabler of Organizational Strength
In Recent Article onRead moreScott Stewart, Vice President of Intelligence for TorchStone Global, is a pioneer for protective intelligence and counter surveillance. The Great Conversation…
-
Assessing threats to sports and entertainment venues with TorchStone Global
In Recent Article onRead moreSky Sports' Anton Toloui spoke with Scott Stewart, Vice President of Intelligence and Chris Sanchez, Vice President, both representing TorchStone…
-
The Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion
Read moreSince its inception in the UK in October of 2018, XR has become one of the fastest-growing protest campaigns in…
-
The Geography of Corporate Espionage Threats
Read moreIn 2017, a Chinese operative sneaked into the Massachusetts-based Medrobotics' headquarters building. The intruder was accidentally discovered after hours as…