By Andy Jabbour Elections are inherently divisive, and (if you listen to the rhetoric) each one is “the most important…
By Andy Jabbour In establishing Gate 15, one area I hoped to develop was the idea of service. As a…
By Mayya Saab National Preparedness Month is recognized each September to promote family and community disaster as well as emergency…
In this update on threats that are neither entirely comprised of physical or cyber parts, known as blended and complex threats, we explore their complexities and consequences as they become relevant to the security and resiliency of our critical infrastructure
A webinar for the RE-ISAC by Trend Micro’s Numaan Huq and Stephen Hilt, and a panel discussion including Numaan, Stephen and Gate 15’s Jennifer Walker.
We use the term blended and complex threats to account for threats that operate within and cross-over physical and cyber boundaries. This post includes examples of the terms above contextualized in recent incidents and vulnerabilities.
Three simple things that anyone can to do to maintain reasonable password security.
By Omar Tisza As cyber-adversaries become sophisticated in their attacks against critical infrastructure, we see the level of sophistication between…
By Mayya Saab This January, our team gathered for one of our too infrequent in-person all-hands huddles. Among the other…
By Omar Tisza In our quest to continue exploring salient examples of complex and blended threats, we have complied a…
I often get asked, “what is Gate 15” or “what does that mean?” A lot of folks assume it has…
by Andy Jabbour Too many cookies, another Detroit Lions loss, and a slew of predictions for next year… it…
By Omar Tisza Cyber threats are increasingly gaining the full attention of industry and–most recently–government as the Department of…
By Andy Jabbour Eleven months ago, I wrote: Following the House of Representatives, the US Senate needs to approve…
Over the course of this year, our team has shared a number of posts regarding blended and complex threats. As…
By Bridget Johnson A federal judge delivered a pointed criticism of how the corrections system deals with jihadism when…
“If you don’t immediately stop the clearing of the Hambach Forest, we will attack your servers and bring down your…
by Andy Jabbour Seemingly every day a new data breach is reported, a new cybercrime effort is launched, fraud and extortion…
“Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they…
A new report from the Cyber Threat Alliance (CTA) highlights one type of blended threat that organizations should be aware…
Sean Lyngaas, @snlyngaas, writing in CyberScoop last week, wrote, “When it comes to protecting faith-based organizations from hackers, divine intervention will…
US critical infrastructure, most recently defined in President Obama’s 2013 Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience,…
In this blog, we’ve written a few times about the idea of “Blended Threats,” and some of the ways the…
By David Pounder This is the third and final part of an ongoing series focused on the Hostile Events Attack…
By Bridget Johnson (@BridgetCJ) Much of the action at Saturday’s Unite the Right rally in Washington took place off…
By Brett Zupan There is a tremendous amount of information that analysts, security and risk leaders, executives, and others…
By David Pounder This is the second part of an ongoing series focused on the Hostile Events Attack Cycle. Previously…
In a recent post introducing the preparedness efforts that the National Health Information Sharing and Analysis Center (NH-ISAC) is taking to…
By David Pounder Threats operate in all shapes and sizes, and whether by design or not they tend to follow…