Help! Is This a Cyber or Physical Threat?
By Omar Tisza As cyber-adversaries become sophisticated in their attacks against critical infrastructure, we see the level of sophistication between nation state and criminal threat actors increasingly blur as both groups seem to use many of the same tools and tactics...
Complex and Blended Threats: Weaponizing the Cyber World
by Omar Tisza With January already in the rearview mirror–and the proliferation of complex and blended threatsgrabbing the attention of more and more security practitioners like high beams on a semi-truck–we have curated poignant examples of threats, attacks, and...
Recognizing Homeland Security Excellence
By Mayya Saab This January, our team gathered for one of our too infrequent in-person all-hands huddles. Among the other points of discussion, we took some time to recognize our team and introduce three new awards recognizing areas we consider important to our success...
Have a Blended and Complex New Year!
By Omar Tisza In our quest to continue exploring salient examples of complex and blended threats, we have complied a few incidents and articles that further underscore a need for understanding such threats. Looking to 2018 retrospectively as we turn to yet another...
Gate 15: What’s in a Name?
I often get asked, “what is Gate 15” or “what does that mean?” A lot of folks assume it has something to do with airports and / or my military deployments. Actually, Gate 15 is an acronym. The name Gate 15 is acronym, representing the priorities I established when I...
Not-So-Bold Predictions: ISACs Continue Close Collaboration in 2019…
by Andy Jabbour Too many cookies, another Detroit Lions loss, and a slew of predictions for next year… it must be that wonderful time between Thanksgiving and New Year’s! From what will be trending to what the big headlines will be, as many experts (and...