category
-
How Espionage, Cybercrime, and Social Engineering Exploit...November 6, 2025LinkedIn, once regarded primarily as a professional networking and career-building platform, has evolved into a
-
Phone Spoofing and AI Voice ScamsMarch 10, 2025Phone spoofing has become a common tool for criminals, enabling them to disguise their identities and deceive
-
Understanding Intelligence in Risk and Threat AnalysisFebruary 4, 2025Defining Intelligence Intelligence, in its broadest sense, refers to the process of gathering, analyzing, and
-
Vehicle Hacking. Is it possible?January 15, 2025The adoption of electric vehicles (EVs) in both Canada and the United States is rapidly growing, driven by increased
-
Gift card fraud. What you need to know.January 9, 2025Gift cards have become a convenient and popular gifting option across Canada, frequently displayed on racks in major
-
BlueSky – White HatDecember 19, 2024BlueSky – White Hat White hat exercises, also known as ethical penetration testing, are indispensable tools for
-
Sexual Misconduct Investigations – Where to startDecember 16, 2024Sexual misconduct investigations within organizations are among the most sensitive and challenging inquiries to
-
Sustainability and ESG top of mind for security managersDecember 13, 2024In 2024, Sustainability and ESG (Environmental, Social, Governance) risks have become a major focus for security
-
CEO Shooting – The Threat AssessmentDecember 11, 2024The NYPD has made significant progress in the investigation of Luigi Mangione, the suspect charged with killing





