THE TORCHSTONE WATCH

THE TORCHSTONE WATCH

Managing Risk in an Increasingly Complex World

ABOUT

TorchStone publishes The Watch to assist our readers in proactively managing risk—whether personal, professional, or organizational—in an increasingly insecure world. The featured articles, blog posts, and expert interviews address vulnerabilities and issues we have frequently encountered while safeguarding high profile individuals, wealthy families, multinational corporations, and international sporting events across six continents. Now, more than ever, security seems to be a precious commodity. Our goal is to give you more of it through The TorchStone Watch.

SPOTLIGHT ISSUE

Phishing and Spear Phishing Attacks-TorchStone-Global

Cyber Threats Part 2: Phishing and Spear Phishing Attacks

By TorchStone Senior Analyst, Ben West

The second in a five-part series will explore phishing, and the more targeted spear phishing attack, and how they manipulate information while creating a sense of urgency to trap the unwary. Used within the Cyber Attack Cycle, phishing attacks can allow the attacker some level of unwanted access to a victim’s accounts, devices, or even the entire network. This type of cyber attack leverages initial access to possibly conduct further surveillance and collect more information to launch additional sophisticated attacks.

READ MORE

ARTICLES

Cyber-Security-Series-Pt1-TorchStone-Global

Cyber Threats Part 1: Understanding the Cyber Attack Cycle

Cyber attacks leverage information to gain access to proprietary networks, electronic devices, and chains of command in order to gain intelligence, funds, cause disruptions, or all of the above. Attackers can range from the highly sophisticated, state-backed advanced persistent threats to well-organized, financially motivated criminal groups, to more rudimentary individual scammers. The first in a five-part series will explore the Cyber Attack Cycle and how it applies to malware and social engineering use in several common types of cyber attacks.

READ MORE >
Cyber Security and Human Vulnerability TorchStone Global

Cyber Security and Human Vulnerability

Keeping a company safe from cyber attacks often only includes technical security such as properly installed hardware with up-to-date firmware, or preventative software. However, often overlooked is the true vulnerability to a company’s system—its people. Vice President of Intelligence Scott Stewart breaks down why the human element is most targeted by bad actors and what companies must do to protect their people and themselves.

READ MORE >
Propaganda of the Deed: Contextualizing the Buffalo Attack TorchStone Global

Propaganda of the Deed: Contextualizing the Buffalo Attack

The shooting in Buffalo, NY exemplifies how white supremacists use the internet to broadcast their attacks to spotlight their radicalized beliefs and spread an excessive amount of fear. Steps must be taken to prevent such bad actors from succeeding in this effort as they advance through their terrorist attack cycle.

READ MORE >
TorchStone-Global---Bomb-Threats-in-Perspective

Placing Bomb Threats in Perspective

In the wake of the recent wave of bomb threats placed to Historically Black Colleges and Universities (HBCUs) I have been asked about the threats and what they mean for the HBCU institutions and their students. These threats give us an opportune time to discuss in general terms the topic of bombs, bomb threats, and how to respond to them.

READ MORE >

BLOG

Gauging the Jihadist Movement 20 Years After 9/11

“While much attention has been paid of late to homegrown far-right and far-left extremists, jihadist terrorism has not disappeared—it merely evolved. So, as the world marks the 20th anniversary of the 9/11 attacks, it behooves security professionals to take stock of the jihadist movement today, forecast where the movement is headed, and consider the implications of ongoing terrorist activity.”

READ MORE >

Taliban Continues Rapid Offensive in Afghanistan

The Taliban’s rapid push to take over Afghanistan in a matter of days means many remaining organizations should ensure they still have a way to leave the country. While groups that operate generally in the Middle East may not be nearly as impacted, Scott Stewart explains to Security Management what steps such organizations still within Afghanistan should take to diminish their risk of being trapped in-country.

READ MORE >

The Balancing Act Behind Sporting and Entertainment Venues Opening to the Public

As events cautiously open up to the public, security teams are faced with an unforeseen element of protection — personal health and safety. Event security teams are forced to weigh the benefits of increased security measures with the goals of the venue’s event, making it enjoyable, profitable, and well-attended. TSG President Frank Rodman discusses these complexities with the host of The Ontic Center for Protective Intelligence Podcast, Fred Burton.

READ MORE >

Virus Be Damned: Tokyo’s Games Must Go On

The 2020 Summer Olympics in Tokyo, Japan, was originally postponed due to the COVID-19 pandemic. However, while Japan’s medical community still has concerns that the Olympics may be a superspreader event and among strong public opposition, the Tokyo Summer Games will begin this July. Howard Snyder, TorchStone’s Asia Specialist, details the pressures behind the decision to give the 2020 Summer Games the green light in Asia Times’ Virus be damned: Tokyo’s Games must go on.

READ MORE >

Premier Sports Network partners with TorchStone Global to protect athletes from rising security threats

Premier Sports Network is a private networking platform exclusively for sports professionals that ensures professional athletes receive needed support of their personal lives. Professional athletes around the globe and their families are increasingly targets of crime, racial attacks, or social media abuse. TorchStone Global’s partnering with PSN allows sports leagues to provide the highest quality protection for their players as well as full advantage of TorchStone’s extensive experience and proactive risk management approach. 

READ MORE >

Manage your risk in an uncertain world by subscribing to our mailing list.

* indicates required

Follow Us