-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
BBC Sounds: Burn Wild Podcast – The Line
In Blog onThere is a school of thought in activism—all movements need a radical flank to succeed. In the podcast, Burn Wild…
-
How to Get on a Watchlist Episode 5: How to Kidnap an Executive
In Blog, Corporate Security on“How to get on a Watchlist” is a new podcast from the team at Encyclopedia Geopolitica. In this installment, How…
-
With drug cartel violence, is it safe to travel to Mexico? Security experts weigh in
In Blog onUS tourism is ramping up again in Mexico, but so are the headlines regarding drug cartel violence. TorchStone Vice President…
-
Perspectives on the Shinzo Abe Assassination
In Blog onPerspectives on the Shinzo Abe Assassination whitepaper from AT-RISK International, Emergent Risk International, Ontic and Torchstone Global analyzes the July…
-
Countering Insider Threats and the “Little Hook”
One of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…
-
Messing With Their Heads: Manipulating and Detecting Hostile Surveillance
Security members and teams can employ aspects of the same tools professional intelligence officers use to identify hostile surveillants. Nearly…
-
The Global Food Crisis and Political Risk in Private Sector Risk Assessments
The possible resumption of Ukrainian grain exports will only moderate the global food crisis, not resolve it. Weather and other…
-
Cyber Threats Part 5: Supply Chain Attacks
The fifth in a five-part cyber threat series focuses on supply chain attacks. This indirect approach will exploit a weakness…
-
Why is Protective Intelligence Effective?
Action is always faster than reaction. Therefore, the advantage will be with the security team who can prevent an incident…
TorchStone Global > Blog