By Bridget Johnson Vows of expanded cyber warfare between white nationalist groups and Anonymous and other foes in the wake…
With two major hurricanes impacting the United States in short order and two more systems spinning in the Atlantic, many…
By Andy Jabbour Concluding the series we’ve been writing with our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber…
By Bridget Johnson A planned sustained protest action centered in the nation’s capital this week promises to broaden in size…
By Andy Jabbour In the coming days, as the immediate aftermath of Harvey transitions to the longer-term recovery, media attention…
By Bridget Johnson Heated protests that have lulled since the deadly white nationalist rally in Charlottesville will be rekindled this…
Our team at Gate 15 continually strives to improve the value of our work for both our client projects and…
Today’s post wraps up the series we’ve been writing with our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber…
Key Points: It is every person’s right to protest against, or petition their government for, whatever issue is of concern.…
Today’s post concludes our mini-series within a series, as we complete the posts addressing he planning and conduct of exercises…
Today’s post continues the fifth part of our ongoing series on applying the Preparedness Cycle to Cyber Risk Management. This…
In our 16 May 2017 blog post, we addressed the WannaCry outbreak and how the cyber-incident highlighted the ineffectiveness of…
Today’s post begins the fifth part of our ongoing series on applying the Preparedness Cycle to Cyber Risk Management. This…
On 27 July, Gate 15’s Kristi Horton and SurfWatch Labs’ Adam Meyer addressed: Recent extortion and ransomware attacks against entertainment…
This is the fourth in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
This is the third in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
We assess that while the month will be largely peaceful and do not expect significant security incidents, there is an…
This is the second in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
About a week ago, as we were coming out of the initial concerns relating to the WannaCry ransomware outbreak, I…
This week, terrorists have conducted attacks in the United Kingdom, Indonesia, the Philippines, Somalia (and other parts of Africa), as…
Business Email Compromise (BEC) is a more specific form of Email Account Compromise (EAC). Email accounts can be compromised by…
The National Terrorism Advisory System is an inadequate tool to communicate threats and risks to homeland security. From Friday, over…
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it…
This is the first in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness…
Introduction. At Gate 15, we believe that to properly assess risks and effectively plan and conduct preparedness and operational activities…
If I were asked by someone in Toronto in the weeks ahead of yesterday’s international May Day demonstrations “what should…
Recently, two Gate 15 team members – Kristi Horton, Senior Risk Analyst in Cybersecurity, and Chip Wickenden, Director of Strategic…
The Gate 15 Company is committed to providing the highest quality analysis, preparedness and operational support to help minimize client…
The Gate 15 Threat and Risk Analysis Cell’s (TRAC) weekly sweep of open-source media has revealed three topics for security and preparedness…
Introduction. We’re excited to have recently added two more great partners to our community! At Gate 15, our team focuses…