Social Media for Executive Protection

Jason JubinvilleExecutive Protection

How Executive Protection Teams can use Social Media to Protect VIPs “[Executive Protection] refers to security measures taken to ensure the safety of VIPs or other individuals who may be exposed to elevated personal risk because of their employment, celebrity status, wealth, associations or geographical location.” – Wikipedia All large organizations, at some point, need to determine which employees are … Read More

The Privacy Debate: Anonymity or Not?

Stephanie MeadowsGeneral, OSINT

This week brought new privacy concerns for Uber customers according to this TIME article. The revised policy that will take effect July 15th states that the company can now track users’ behavior; even gather contacts details when the app is closed on their mobile device. The privacy rights group, the Electronic Privacy Information Center, or EPIC, filed a complaint with … Read More

5 Ways to Protect Your Intellectual Property on Social Media

Stephanie MeadowsAsset Monitoring, Brand Protection, Cyber Security

Our thanks to Stephanie Meadows for letting us re-post her article on 5 ways to protect your intellectual property on Social Media. It was originally published on LinkedIn and can be accessed here. In a time when keeping your intellectual property private has become increasingly more difficult, how do companies manage the kind of content that their employees are sharing … Read More

8 Essential Tools For Online Safety & Security – Part 3

Jason JubinvilleBrand Protection, Cyber Security

Crash course in online security round THREE If you haven’t had the opportunity to read part one & two, you can find them right here & here. They discuss the first four of our top eight security need-to-knows. This third segment rounds out our list by discussing a few other best practices. And in case it all goes to hell, we’ve got you covered in the … Read More

8 Essential Tools For Online Safety & Security

Jason JubinvilleBrand Protection, Cyber Security

Which of these three links is malware? Link1 Link2 Link3 None actually. But how do you know before it’s too late? We want to show you how. Our goal with the security minded section of our blog is to give you a quick-and-dirty rundown on all the things that you could be doing to improve your online safety. Starting with the … Read More

How We Found Evidence of a Russian Fighting in Ukraine

Jason JubinvilleOSINT

Recently, the media has been paying close attention to the Donetsk region in northeast Ukraine. We decided to look for ourselves to see if we could identify military personnel of Russian origin in the area. From a citizen journalist, or global security context, the data pouring from this region can play a pivotal role understanding what is going on. Quick, informed … Read More