WannaCry Demonstrates the Inadequacy of the National Terrorism Advisory System (NTAS)
The National Terrorism Advisory System is an inadequate tool to communicate threats and risks to homeland security. From Friday, over the weekend, and continuing, organizations around the world, to include numerous entities within the critical infrastructure...
Cyber Extortion: More Than Just Ransomware
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it could be anything deemed to be as something of value. The extortioner may desire a decision made in his/her favor or the...
Cyber Risk Management: Introduction to the Preparedness Cycle
This is the first in a short series we're writing for our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber Risk Management. Bad things happen. Whether we’re dealing with our personal or professional business, life seems to always have a variety of...
An Interview with Bridget Johnson, Veteran Journalist & Washington Editor for PJ Media
Introduction. At Gate 15, we believe that to properly assess risks and effectively plan and conduct preparedness and operational activities one must start with a firm understanding of the threat environment. We strive to help that through our free daily report, the...
Exploding Sidewalks!? Be Ready for the Unexpected
If I were asked by someone in Toronto in the weeks ahead of yesterday’s international May Day demonstrations “what should I be most concerned about on May Day,” I would have rattled off some concerns about protests, vandalism, the potential for escalation, lone actors...
Ransomware: From Cyber Crime to Physical Attacks?
Recently, two Gate 15 team members - Kristi Horton, Senior Risk Analyst in Cybersecurity, and Chip Wickenden, Director of Strategic Relationships, had a conversation about ransomware and different kinds of threat actors that took some interesting turns. We captured...