Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

Services Overview

Insider Threat Webinar

Getting Inside Insider Threats: Response and Mitigation. Stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft.

News

External Author


Recent Posts

Americans could be a bigger fake news threat than Russians in the 2020 presidential campaign

By External Author on Nov 20, 2019 8:00:00 AM

Russians and others won't stay out of 2020. But they'll be able to amplify US-created disinformation and have more time to disrupt 2020 in other ways.

Topics: Technology News
Continue Reading

Getting Ahead Of Insider Threats

By External Author on Nov 19, 2019 8:00:00 AM

We live in an age of heightened interpersonal conflict, stress and anxiety in the workplace. One of the fallouts of all of this is data theft. According to Verizon's 2019 Insider Threat Report, insider threat actors are prevalent in many industries, and the causes range from personal gain (such as selling sensitive data on the black market) to a disgruntled employee who lashes out in retaliation for a perceived slight. An employee may also unknowingly become a pawn in an external actor’s game of gaining access or, more likely, they may be simply careless in their use of technology.

Topics: News
Continue Reading

Olive Garden funding Trump? How a false rumor ignited a Twitter boycott

By External Author on Nov 18, 2019 3:30:00 PM

The hashtag #BoycottOliveGarden went viral this week on Twitter, amid claims that the Italian restaurant chain was helping to fund President Trump’s reelection campaign. The problem, according to the restaurant and independent researchers, is that it’s just not true.

Topics: Technology News
Continue Reading

The Disinformation Dilemma (Part II)

By External Author on Oct 3, 2019 12:00:00 PM

The number of countries in the cross-hairs of political disinformation campaigns more than doubled to 70 in the last two years, according to a recent report from researchers at Oxford University. Given the efficacy of such attacks, it’s not surprising that disinformation campaigns are also becoming a business problem. Companies as varied as Olive Garden, Koch’s Turkeys, and Columbine Chemicals have been recent victims of massive social media hoaxes spreading false information connected to their product or brand.

Topics: Cybersecurity
Continue Reading

Disinformation Attacks Aren't Just Against Elections

By External Author on Aug 29, 2019 3:30:00 PM

While disinformation is getting a lot of attention in security circles, the discussion primarily tends to be in the context of election security. However, hacking social media accounts, or creating fake accounts, to post false messages about a company is absolutely a disinformation campaign.

Continue Reading

Spotting a Scam Account on Twitter

By External Author on Aug 14, 2019 2:00:00 PM

Meet Harrison. Harrison is “good, loving, caring, and kind hearted.” Harrison is also a fake account, though it might not look like it on first glance.

Topics: News
Continue Reading

How To Control Your Digital Footprint Without Losing Your Mind

By External Author on Jul 25, 2019 12:30:00 PM

Note that this is not a one-time exercise, but a digital hygiene process which should be rinsed and repeated at regular intervals.

Topics: News
Continue Reading

On The Fintech Carousel: Entering The Mobile Payments Space Requires Vision And Equilibrium

By External Author on Jul 11, 2019 1:00:00 PM

What lies ahead in fintech is a groundswell of rapidly and constantly developing regulatory requirements and unbridled opportunity.

Topics: News
Continue Reading

Strengthening The ‘Soft Underbelly’ Of Cybersecurity (Part II)

By External Author on Jun 27, 2019 2:00:00 PM

Attack simulations, physical security, social engineering, and open source intelligence assessments can help law firms learn and self-correct before a real hacker gets through first.

Topics: News
Continue Reading

Strengthening The ‘Soft Underbelly’ Of Cybersecurity (Part I)

By External Author on Jun 13, 2019 12:30:00 PM

Attack simulations, physical security, social engineering, and open source intelligence assessments can help law firms learn and self-correct before a real hacker gets through first.

Topics: News
Continue Reading

Featured