Elon Musk praised for providing Ukraine with internet access

Developing a “Corporate Foreign Policy”: The Urgent Need for Boardroom Geopolitics Strategies

| | Blog Posts
An era of pervasive geopolitical tumult means that companies, and the executives who run them, must begin formulating and following coherent strategies for global engagement. In the first piece of a series on the intersectionality of geopolitics and global business, Colin Reed explores this growing need, and poses early recommendations ... Read More

A Unique Approach to Corporate Security in Biotech: A Q&A with Exact Sciences

| | Blog Posts
We recently sat down with Scott Brinkman, the Associate Director of Global Security at Exact Sciences Corporation to discuss the approach his team takes to protective intelligence, threat assessment and how his corporate security program differs within a fast-moving biotech company.  Exact Sciences Corporation is an international molecular diagnostics company ... Read More

Club Q Shooting in Colorado

| | Blog Posts
The Nov. 19 fatal shooting at an LGBTQ nightclub in Colorado Springs highlights the continuing trend of a worsening threat environment for the LGBTQ community in the United States. The incident prompts memories of a similarly deadly mass shooting at the Pulse nightclub in Orlando in 2016. The Colorado Springs ... Read More
Rising Up! How Things Change: The Duty to Disobey | March 2017 ‎‎

The Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion

| | Blog Posts
This is the fourth installment in an occasional series examining threat actors from a protective intelligence perspective. Earlier articles in this series examined the Islamic State pole of jihadism, Antifa, and the Boogaloo movement. This article discusses the background of some of the activists behind the Extinction Rebellion campaign (XR), their ideology, their past activities, ... Read More

Messing With Their Heads: Manipulating and Detecting Hostile Surveillance

| | Blog Posts
One of the fundamentals of TorchStone’s approach to understanding and countering criminal behavior is that attacks “don’t just happen.” Crimes of all types are the result of processes and behaviors that can be understood and detected. One of these key bellwether behaviors is pre-operational surveillance. Almost every criminal act, from a ... Read More
SPAs: Attack Surface Are Us

SPAs: Attack Surface Are Us

Web designers love Single Page Applications (SPAs) because they load quickly in the browser. The risk posed by these web apps should not be underestimated ... Read More
Is My Data for Sale on the Dark Web?

Is My Data for Sale on the Dark Web?

Is your company's corporate network access for sale, too? Find out now. New research shows: remote work vulnerabilities have dark web marketplaces booming ... Read More
Remote Work: Bad Cybersecurity Advice Galore

Remote Work: Bad Cybersecurity Advice Galore

Web advice is plenty and free on how to secure your IT and unmanaged devices when employees work from home. But what's all that 'wisdom' worth in practice? ... Read More
How to Spot an Unsafe Airport

How to Spot an Unsafe Airport

IT security researchers gathered Open Source Intelligence (OSINT) and probed major airports. Many are exposed on the Dark Web, they found ... Read More
Research: More Worries with Wasm

Research: More Worries with Wasm

WebAssembly is taking over execution tasks that were once the domain of JavaScript. Now Wasm is used increasingly for malicious purposes, research shows ... Read More
Loading...

Secure Guardrails