
Developing a “Corporate Foreign Policy”: The Urgent Need for Boardroom Geopolitics Strategies
An era of pervasive geopolitical tumult means that companies, and the executives who run them, must begin formulating and following coherent strategies for global engagement. In the first piece of a series on the intersectionality of geopolitics and global business, Colin Reed explores this growing need, and poses early recommendations ... Read More
A Unique Approach to Corporate Security in Biotech: A Q&A with Exact Sciences
We recently sat down with Scott Brinkman, the Associate Director of Global Security at Exact Sciences Corporation to discuss the approach his team takes to protective intelligence, threat assessment and how his corporate security program differs within a fast-moving biotech company. Exact Sciences Corporation is an international molecular diagnostics company ... Read More
Club Q Shooting in Colorado
The Nov. 19 fatal shooting at an LGBTQ nightclub in Colorado Springs highlights the continuing trend of a worsening threat environment for the LGBTQ community in the United States. The incident prompts memories of a similarly deadly mass shooting at the Pulse nightclub in Orlando in 2016. The Colorado Springs ... Read More

The Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion
This is the fourth installment in an occasional series examining threat actors from a protective intelligence perspective. Earlier articles in this series examined the Islamic State pole of jihadism, Antifa, and the Boogaloo movement. This article discusses the background of some of the activists behind the Extinction Rebellion campaign (XR), their ideology, their past activities, ... Read More
Messing With Their Heads: Manipulating and Detecting Hostile Surveillance
One of the fundamentals of TorchStone’s approach to understanding and countering criminal behavior is that attacks “don’t just happen.” Crimes of all types are the result of processes and behaviors that can be understood and detected. One of these key bellwether behaviors is pre-operational surveillance. Almost every criminal act, from a ... Read More

SPAs: Attack Surface Are Us
Web designers love Single Page Applications (SPAs) because they load quickly in the browser. The risk posed by these web apps should not be underestimated ... Read More

Is My Data for Sale on the Dark Web?
Is your company's corporate network access for sale, too? Find out now. New research shows: remote work vulnerabilities have dark web marketplaces booming ... Read More

Remote Work: Bad Cybersecurity Advice Galore
Web advice is plenty and free on how to secure your IT and unmanaged devices when employees work from home. But what's all that 'wisdom' worth in practice? ... Read More

How to Spot an Unsafe Airport
IT security researchers gathered Open Source Intelligence (OSINT) and probed major airports. Many are exposed on the Dark Web, they found ... Read More

Research: More Worries with Wasm
WebAssembly is taking over execution tasks that were once the domain of JavaScript. Now Wasm is used increasingly for malicious purposes, research shows ... Read More