By Bridget Johnson The latest issue of the Islamic State’s English-language Rumiyah magazine featured a testimonial from a woman identified…
By Bridget Johnson The 19 Sept. magnitude 7.1 earthquake centered southeast of Mexico City, which caused select buildings to crumple…
By Kristi Horton The “Most Wonderful Time of the Year” is coming – and much sooner than many of us…
By Bridget Johnson The location of 15 Sept. bombing of a London Underground train underscores the efficacy of al-Qaeda suggestions…
By Bridget Johnson Shortly before the 16th anniversary of the 9/11 terror attacks the Islamic State released the 13th issue…
By Bridget Johnson Vows of expanded cyber warfare between white nationalist groups and Anonymous and other foes in the wake…
With two major hurricanes impacting the United States in short order and two more systems spinning in the Atlantic, many…
By Andy Jabbour Concluding the series we’ve been writing with our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber…
By Bridget Johnson A planned sustained protest action centered in the nation’s capital this week promises to broaden in size…
By Andy Jabbour In the coming days, as the immediate aftermath of Harvey transitions to the longer-term recovery, media attention…
By Bridget Johnson Heated protests that have lulled since the deadly white nationalist rally in Charlottesville will be rekindled this…
Our team at Gate 15 continually strives to improve the value of our work for both our client projects and…
Today’s post wraps up the series we’ve been writing with our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber…
Key Points: It is every person’s right to protest against, or petition their government for, whatever issue is of concern.…
Today’s post concludes our mini-series within a series, as we complete the posts addressing he planning and conduct of exercises…
Today’s post continues the fifth part of our ongoing series on applying the Preparedness Cycle to Cyber Risk Management. This…
In our 16 May 2017 blog post, we addressed the WannaCry outbreak and how the cyber-incident highlighted the ineffectiveness of…
Today’s post begins the fifth part of our ongoing series on applying the Preparedness Cycle to Cyber Risk Management. This…
On 27 July, Gate 15’s Kristi Horton and SurfWatch Labs’ Adam Meyer addressed: Recent extortion and ransomware attacks against entertainment…
This is the fourth in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
This is the third in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
We assess that while the month will be largely peaceful and do not expect significant security incidents, there is an…
This is the second in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
About a week ago, as we were coming out of the initial concerns relating to the WannaCry ransomware outbreak, I…
This week, terrorists have conducted attacks in the United Kingdom, Indonesia, the Philippines, Somalia (and other parts of Africa), as…
Business Email Compromise (BEC) is a more specific form of Email Account Compromise (EAC). Email accounts can be compromised by…
The National Terrorism Advisory System is an inadequate tool to communicate threats and risks to homeland security. From Friday, over…
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it…
This is the first in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
Introduction. At Gate 15, we believe that to properly assess risks and effectively plan and conduct preparedness and operational activities…