ACTIVE SHOOTER: EMPLOYEE TRAINING AND RESPONSE PLAN

In this day and age, active-shooter events are commonplace as we see more and more reports of yet another mass shooting in America. They can happen anywhere, at any time. The University of Alabama found that in America, it is more likely to have a mass shooter incident in the workplace or at a school…

Read article

Training Against a Threat with Drones

Most Soldiers, Police, and security professionals have thought through how to use aerial drones, also called unmanned aerial vehicles (UAV’s), to support their operations by providing surveillance, reconnaissance, and command and control support. However, the low cost of commercial drones now makes it possible for the enemy to field drones, and in many places these enemies…

Read article

Cyber Security: Five Top Measures to Protect Your Companies Digital Assets

I’m often asked by family and friends what they should do to protect themselves from a cyber-attack, as well as what attacks they’re susceptible to. There are so many types of attacks out there: Distributed Denial of Service (DDoS), malware injection, ransomware, adware, phishing, spear-phishing, zero-day, etc. Social engineering continues to be successful in compromising…

Read article

Most Common Mistakes Filmakers Make with On-Set Weapons

 Do you remember Die Hard? It’s only the best Christmas movie of all time AND it is also the reason the Beretta 92S is such a popular hand gun, even today. Movies impact society and ultimately, whatever weapon the hero uses in a blockbuster hit, will be reflected by an uptick of sales for said weapon…

Read article

How Threat Tec Threat Studies are Shaping Military Decision Making

While Threat Tec utilizes the latest in threat technology, manufacturing and analysis to effectively replicate new and emerging threats, it is also capable of compiling research data to do more than training for warfare simulation. With a variety of military backgrounds and operational experience at the tactical, operational, and strategic levels, Threat Tec Subject Matter…

Read article