News

12 Things Every CIO Should Know

Posted by Lorissa Morton on Aug 3, 2017 9:18:00 AM

 

With every business and IT decision, we now have to take cybercrime into account. Behold our list of 12 things every Chief Information Officer (CIO) should know. Ginni Rometty, IBM’s CEO, has stated that, “Cybercrime is the greatest threat to every company in the world.”

Now even if you have doubts on this statement, it is impossible to deny that security is now part of every business and IT discussion we have. In the future, the necessity of combating these internal and external threats will only be intensified. Due to this essential need, we’ve compiled a short list of facts and statistics covering a range of topics from emerging threats posed by hackers to the everyday issues and vulnerabilities found in company cyber security policies.

Read More

Topics: Cyber Security, Criminal Networks, emerging threat, cyber-attacks, malware, hacking

How The Hashtag is Changing Warfare

Posted by Adam Jonas on Jul 6, 2017 10:03:49 AM

HOW THE HASHTAG IS CHANGING WARFARE

June 29, 2017
Read More

Topics: Cyber Security, social media, Social Network Analysis, Criminal Networks, Data Blending, Data Visualization, simulations, threat study, Active Shooter, emerging threat, cyber-attacks, threat assessment, AMERICAS LONGEST WAR, AFGHANISTAN, BOMB THREAT, SWAT training

Here's why your first responder team isn't properly trained to tackle today's emerging threats.

Posted by Kristi Dazevedo on Jun 29, 2017 11:22:29 AM

Read More

Topics: Criminal Networks, simulations, Threat Training, Active Shooter, OFFICE VIOLENCE PREVENTION, ARMED INTRUDER TRAINING, CORPORATE TRAINING FOR ACTIVE SHOOTER, nuclear threat, threat assessment, AFGHANISTAN, COMBAT, TRAINING MUNITIONS, TERRORISM, BOMBING, THREAT EMULATION, BOMB THREAT, EXPLOSIVES, ANARCHIST COOK BOOK, BOMB TRAINING, Role player training, law enforcement training, first responder training, SWAT training

THREAT TEC AWARDED GSA CONTRACT

Posted by Kristi Dazevedo on Jun 6, 2017 2:01:00 PM
Read More

Topics: CONTRACT, SCHEDULE CONTRACT, GSA

VIGILANCE: The Internet, Homemade Explosives, and the Enemy Among Us

Posted by Steven Barker on Jun 5, 2017 9:20:00 AM

 

Read More

Topics: ACITVE SHOOTER POLICY, CORPORATE TRAINING FOR ACTIVE SHOOTER, IED, TERRORISM, TERRORIST, EXPLOSIVE, BOMBING, THREAT EMULATION, BOMB THREAT, EXPLOSIVES, IMPROVISED EXPLOSIVE DEVICE, HOMEMADE EXPLOSIVE, ANARCHIST COOK BOOK, BOMB TRAINING

Black Flag Journals: Author & Subject Matter Expert Dennis Woods - Book Signing

Posted by DENNIS WOODS on May 25, 2017 12:41:31 PM

 

Read More

Topics: Data Blending, ARMED INTRUDER TRAINING, IRAC, International Replica Arms Company, AMERICAS LONGEST WAR, AFGHANISTAN, COMBAT TOUR, COMBAT, TRUE HISTORY, DEPLOYMENT, VETERAN, VETERAL AUTHOR, TRAINING MUNITIONS, SOLDIER SAFETY, WAR NARRATIVE, FIRST-PERSON WAR NARRATIVE, TWIN TOWERS, VETERAN EXPERIENCE, BARNES & NOBLE, VIRGINIA BEACH TOWN CENTER

GETTING TO THE POINT: A NORTH KOREAN NUCLEAR THREAT ANALYSIS

Posted by David King on May 25, 2017 9:40:00 AM

Despite the bellicose ravings of North Korea’s leader Kim Jung-un, his government’s exaggerated claims of nuclear capability and a growing list of successful cyber-attacks, North Korea remains, militarily speaking, in a geostrategic hostage standoff.  The United States and South Korea’s ability to defeat the North Korean Army has never been in doubt. 

Read More

Topics: Cyber Security, North Korea, emerging threat, nuclear threat, cyber-attacks, south korea, threat assessment, missile launch

ACTIVE SHOOTER: EMPLOYEE TRAINING AND RESPONSE PLAN

Posted by Daniel Crawford on May 17, 2017 2:11:06 PM

In this day and age, active-shooter events are commonplace as we see more and more reports of yet another mass shooting in America. They can happen anywhere, at any time. The University of Alabama found that in America, it is more likely to have a mass shooter incident in the workplace or at a school over any other location. Therefore, it is critical that the leaders of organizations have a response plan, outlined with emergency protocols, training and regulations to maintain a level of preparedness to minimize impact of such events.

Read More

Topics: Active Shooter, OFFICE VIOLENCE PREVENTION, ARMED INTRUDER TRAINING, ACITVE SHOOTER POLICY, CORPORATE TRAINING FOR ACTIVE SHOOTER, TRAINING STAFF FOR ACTIVE SHOOTER, WORKPLACE PREPAREDNESS FOR ACTIVE SHOOTER

MODSIM: Threat Tec VR Capabilities Turning Heads at the World Conference

Posted by Daniel Crawford on May 4, 2017 2:59:43 PM

This week, Threat Tec made its way to the Virginia Beach Convention Center for the 2017 MODSIM World conference. MODSIM World is a multi-disciplinary conference in which sponsors exchange modeling and simulation knowledge, research and technology. With local, national, and international attendance, MODSIM World 2017 will address the state of Modeling and Simulations in the community domains of today; including critical infrastructure, maritime, healthcare, aerospace, and defense and homeland security.

Read More

Topics: Data Visualization, modeling, simulations, vr

SOCIAL NETWORK ANALYSIS: How, What, and Who to Consider with Criminal Networks.

Posted by Adam Jonas on Apr 25, 2017 10:22:00 AM


Over the course of the last 15 years many criminal organizations have taken the form of social networks.  These networks are decentralized, complex, and highly adaptable making them difficult to identify and understand.  

 

Modern forms of communication over social media sites and other forms of electronic communication have provided new ways for these networks to communicate and organize creating new challenges to law enforcement agencies attempting to stop covert network.  

 

Social Network Analysis, a field within the social sciences that has been used over the last decade by law enforcement and national security agencies worldwide, offers a toolkit to dismantle various criminal and terrorist organizations. 

Read More

Topics: social media, law enforcement, Social Network Analysis, Criminal Networks, Data Blending, Data Visualization