A Red Team is a non-hostile group or individual that challenges a system or an organization by simulating a potential adversary. This is done in order to uncover security vulnerabilities that are often not apparent to organizational insiders. The term comes from the cold war practice of US forces taking a Soviet, i.e. “red”, perspective.… Read More Red Team
In almost every security training I’ve conducted over the years, the subjects of verbal compliance and verbal management of aggressive behavior have come up. The interest in these topics is found among security and non-security professionals alike. It’s a concern that unites everyone. Having spent years grinding it out in the field, dealing with this… Read More Verbal Management of Aggression
For a little while now, I’ve been looking for a good way to give a ringing endorsement to Left of Bang. For those of you who are unfamiliar with this book, it provides guidelines and instructions on how to look at individuals and environments in order to detect early warning signs and indicators of impending… Read More Left of Bang
This article is intended for non-security professionals who are looking for advice on how to get a physical security program started. OK, you’ve gotten to the point where your organization needs to employ some physical security measures. Now, for most small companies, startups, VCs, foundations and family offices, having to deal with security isn’t… Read More How To Get Started With Physical Security: A Guide For Startups & Small Companies
What follows is Chapter 12 of my new book Surveillance Zone. The book gives you an exclusive, behind-the-scenes look into the mysterious world of private-sector espionage, surveillance detection and covert protective operations. By this point in the book, some of you are bound to start asking how you, too, can get in on the action and become… Read More So You Want To Be A Covert Operator
Are there any overlaps between the physical and cyber security fields? Are there certain corners of cyber security that can best be reached by physical security experts, and vice versa? Can the two fields benefit from more cross-pollination and professional cooperation? The answer to all three questions turns out to be a resounding Yes, and… Read More Patrolling The Cyber-Physical Security Border
I had a great time on SOFREP Radio recently. For those of you who haven’t heard of SOFREP, check it out. These guys do lots of good and provide great content, insights and commentary. It was a true honor to be invited on.