by Gate 15 | Aug 14, 2018 | Uncategorized
In this blog, we’ve written a few times about the idea of “Blended Threats,” and some of the ways the critical infrastructure community is proactively leaning forward in planning for them – such as in the healthcare and higher education sectors. Recently, there...
by Gate 15 | Aug 13, 2018 | Uncategorized
By David Pounder This is the third and final part of an ongoing series focused on the Hostile Events Attack Cycle. To this point, the attacker has gone through the planning and preparation stages necessary to identify a target, visualize the attack, and plan for the...
by Gate 15 | Aug 13, 2018 | Uncategorized
By Bridget Johnson (@BridgetCJ) Much of the action at Saturday’s Unite the Right rally in Washington took place off the court, as social media users pushed messaging that the small turnout indicated that supremacist groups aren’t a problem (homeland security...
by Gate 15 | Aug 6, 2018 | Uncategorized
By Brett Zupan There is a tremendous amount of information that analysts, security and risk leaders, executives, and others try to process daily. In the abundance of noise, we strive to promote a simple idea to developing a threat-informed, risk-based approach...
by Gate 15 | Jul 16, 2018 | Uncategorized
By David Pounder This is the second part of an ongoing series focused on the Hostile Events Attack Cycle. Previously the discussion centered on initial surveillance in potential targets. Specifically, as part of the research into the potential targets, the attacker...
by Gate 15 | Jul 16, 2018 | Uncategorized
In a recent post introducing the preparedness efforts that the National Health Information Sharing and Analysis Center (NH-ISAC) is taking to support increased member awareness and preparedness relating to blended threats, we addressed the importance of developing a...