-
Countering Insider Threats and the “Little Hook”
One of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…
-
Messing With Their Heads: Manipulating and Detecting Hostile Surveillance
Security members and teams can employ aspects of the same tools professional intelligence officers use to identify hostile surveillants. Nearly…
-
The Global Food Crisis and Political Risk in Private Sector Risk Assessments
The possible resumption of Ukrainian grain exports will only moderate the global food crisis, not resolve it. Weather and other…
-
Cyber Threats Part 5: Supply Chain Attacks
The fifth in a five-part cyber threat series focuses on supply chain attacks. This indirect approach will exploit a weakness…
-
Why is Protective Intelligence Effective?
Action is always faster than reaction. Therefore, the advantage will be with the security team who can prevent an incident…
-
Cyber Threats Part 4: Ransomware Attacks
The fourth in a five-part cyber threat series focuses on ransomware attacks where information or computer networks are held hostage…
-
Protecting Yourself From Mass Public Shootings
Most of the material I have produced on personal security, such as articles discussing how to practice situational awareness, counter…
-
Cyber Threats Part 3: Business Email Compromise
The third in a five-part series demystifies business email compromise schemes and how they target those who transfer funds electronically.…
-
Cyber Threats Part 2: Phishing and Spear Phishing Attacks
The second in a five-part series explores phishing, and the more targeted spear phishing attack, and how they manipulate information…
-
Cyber Threats Part 1: Understanding the Cyber Attack Cycle
Cyber attacks leverage information to gain access to proprietary networks, electronic devices, and chains of command in order to gain…
TorchStone Global > Blog