A section taken from the beginning of Chapter Three of the best selling book Just 2 Seconds by Gavin de Becker, Tom Taylor and Jeff Marquart
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: Three Explosions Reported in Mogadishu, Multiple Fatalities Reported as Measles Outbreak Continues to Spread Nationwide, Dozens Arrested in Suspected Terrorism Financing Ring, Fatalities Reported following Explosions in Jolo, Sulu Province
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
Shiite extremists remaining in Baghdad have added a relatively new weapon to their arsenal in the fight against U.S. forces, one with more destructive power than most of the usual improvised explosive devices planted along city thoroughfares – the improvised rocket-assisted mortar.
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: 40 dead in armed attack in Mali, 13 killed in Hostage situation in Mexico, Multiple Islamic State Militants killed in Iraq and explosion on a bus in Sweden.
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
the Deep End, the (Dynamic Evolution Of Executive Protection) can you swim? Since the beginning of time, everything from man to nature has or is evolving; the protection theater is no different.
We are not immune to attack and we owe it to our clients to be well versed on terrorism, and international conflicts, which could have domestic consequences. Ignore what’s going on overseas, and ignore terrorism and we face losing at home.
A brief look at MACE Pepper Gel for Protection Specialists. Pepper Gel is a great option for confrontations that may not warrant a lethal force response.