Threat Mitigation

Summary

  • 51 Companies
  • 4 Patents
  • 6 Use Cases
  • 5 Case Studies
  • 22 Science Papers
  • $40 322 998 Total Funding

Companies

#Organisation NameIndustriesHeadquarterDescriptionFounded YearCompany TypeNum of Employees
1
Information Technology
Woodbridge, NJ
Sequretek is an India headquartered cyber-security firm with customers across North America, Europe, Africa, the Middle East, and India. It is amongst the very few companies who has end to end cyber-security offerings in the areas of Endpoint Security, Identity Access Governance, Threat Intelligence, Security Monitoring, and Security Management. Sequretek has been recognized as the “Security Product Company of Year“ by the Data Security Council of India (DSCI) and was also announced as a winner at India’s Biggest “AI Challenge” at RAISE 2020, an initiative by Ministry of Electronics and IT, MyGov.in and Digital India Corporation. Sequretek has been successful in securing the IT assets of over 100 clients across Banking, Financial Services, Insurance, Manufacturing, Pharmaceuticals, Services, Retail, and Logistics sectors. Sequretek offers cybersecurity solutions for enterprises in four broad areas; a) Endpoint Detection Protection and Response (“EDPR”): An endpoint security product which ensures that no malicious files infect your endpoints using AI and ML, and self-updates to fix existing vulnerabilities. Sequretek EDPR features On-Device Artificial Intelligence which eliminates the need of frequent database updation b) Identity Governance and Administration (“IGA”): An end-user access governance offering which for employee lifecycle management ensuring that employees get the right access at the right time c) Managed Detection and Response (“MDR”): Sequretek MDR is a multi-mode MDR offering which features Predictive threat detection and analytics, threat hunting, and threat mitigation using deep learning algorithms, big data lakes, and automated incident orchestration layer d) Managed Security Services (“MSS”): SLA based managed of customer’s security infrastructure on a 24x7 basis The company has acquired marquee clientele which consists of leading companies in Manufacturing, BFSI, Pharmaceutical, IT/ITES, and Retail and Logistics sectors.
2013
Privately Held
318
2
Security and Investigations
New York, NY
Harvard Protection Services is one of the nation’s premier security firms, providing a comprehensive suite of enterprise protection and security solutions, addressing today’s most challenging threat mitigation needs. Launched in 1996, Harvard’s goal remains to meet the growing demand for a single, reliable source, to manage clients’ high level security requirements. We deliver best-in-class security services and provide excellent customer service predicated upon our unparalleled expertise in the industry applied to a thorough understanding of client needs. We fully appreciate that each contract for security services is a complex mission that requires much more than supplying qualified manpower. We welcome the opportunity to work with clients who recognize that collaborative engagement, communication, ongoing program evaluation, and performance management metrics are crucial to the formulation and refinement of a solid business plan. Our approach establishes clear performance standards and operational protocols, yet allows for the flexibility necessary to respond to emergencies and an ever changing risk environment. Among the qualities that set Harvard apart from our competitors is the depth and breadth of experience in our management team, as well as the level of engagement of Harvard’s top leadership in all facets of contract operations to ensure continuous needs assessment, provide attention to detail, and offer critical review of operational requirements. Unlike many other vendors, our business model for providing security depends upon an infrastructure of talent and multi-disciplinary expertise at-the-ready to effectively prepare for and respond to a myriad of conditions with potentially high stakes outcomes. Likewise, our staffing model incorporates building bench strength and force multiplier capabilities that are immediately available for deployment in the event of emergencies.
1996
Privately Held
211
3
Cybersecurity
Reston, VA
LookingGlass develops cybersecurity solutions that empower organizations to meet their missions with tailored, actionable threat intelligence and threat mitigation capabilities that move at machine speed. For more than a decade, the most advanced organizations in the world have trusted LookingGlass to help them protect financial systems, ensure telecommunications are cyber-resilient, and safeguard economic and national security interests. Rooted in operationalizing threat intelligence, LookingGlass solutions help reduce the time to detect and respond to incidents, enable cyber investigations, optimize threat hunt operations, and improve analyst productivity and efficiency. By linking the risks and vulnerabilities from an organization’s external attack surface to customized threat actor models, LookingGlass provides a more complete view of cyber risk and enables systematic definition and deployment of mitigations to defend against the threats that matter.
2009
Privately Held
168
4
Defense and Space
Southern Pines, North Carolina
K2 Solutions, Inc. is a Veterans Administration Certified Service-Disabled Veteran-Owned Company We provide global customers precise solutions through innovative applications, superior products & services, and modernization of security capabilities. We have a responsibility to our customers to provide the best possible experience by holding ourselves and our solutions to exceptional-standards. We operate at the forefront of the global defense and threat mitigation arena for the United States and its Allies. Our subject matter expertise includes special operation forces, intelligence, canine detection, information technology & security, and logistics.
2003
Privately Held
116
5
Computer Networking
Norcross, GA
Layer 3 Communications is an engineering firm that specializes in providing complex network services and products. Along with its hosted solutions, the company provides its customers design, management, optimization and ongoing support of network infrastructure and security (including real-time monitoring and zero-day threat mitigation). Our philosophical approach involves using capital (people, processes and technology) to solve problems. Founded in 1998 by Josh Bailey and Rodney Turner, Layer 3 Communications is based on the principal that the highest levels of expertise and professionalism are the keys to ensuring happy clients. The organization, headquartered in Norcross, GA, has locations across the southeastern United States. Our offices are located in Texas, Alabama, Tennessee, Georgia, Florida and the Carolinas. Layer 3 Communications’ core value to our clients is in our technical expertise and professionalism. Our technical services team outnumbers our sales and operations personnel by a ratio of 3:1. We maintain the top level of certifications with our manufacturer partners, and in many cases provide technical support to our clients on their behalf. For more information, visit our website at http://www.layer3com.com or follow us on Facebook at www.facebook.com/Layer3Communications.
1998
Privately Held
106
6
Security and Investigations
New York
By creating and implementing comprehensive solutions that targets each client’s needs, Global Operations Security Services Inc provides unparalleled physical and technological security threat mitigation solutions to governmental, organizational, educational, corporate, and individual entities. In 2009, Global Operations Security Services Inc’s founders - former leading members of the Israeli Security Agency (Shin Bet), Israeli Ministry of Defense and the Israeli Defense Forces, and later joined by top U.S. military and security operatives - applied their unique operational knowledge and expertise to create innovative solutions to address the constantly evolving security needs of our clients. To date, we have implemented security solutions at more than 200 institutions, including schools, houses of worship, community centers, residential events, and delegations throughout the Tri-state area. PHYSICAL SECURITY ARM We offer comprehensive physical security solutions that integrate seamlessly with an existing facility’s needs and budget concerns while ensuring that daily operations continue uninterrupted. TECHNOLOGY When designing a project, we integrate a variety of cutting edge systems and platforms to deliver fully customized solutions to address the client’s security technological needs. Global Operations Security Services Inc understands and operates within today’s environment while analyzing tomorrow’s potential threats. We are currently seeking On-Call, Full-Time and Part-Time Unarmed Security Agents to join our physical security team. If interested, please email a copy of your resume to [email protected]
2009
Privately Held
63
7
-
Hamilton, Ontario
Providing specialized services including: - Threat Intelligence - Vulnerability Assessment - Penetration Testing - Computer Forensics - Data Recovery - Threat Mitigation - Identity and Access Management - Security Assessment - Security Governance - Security Awareness Training
2009
Privately Held
12
8
Security and Investigations
Troy, MI
Threat Mitigation Partners will protect your corporate, institutional, and individual assets. We seek solutions to prevent and detect threats to people and operations before they occur, and mitigate the fallout during and after. Our goal is to help you put controls in place to protect your organization from financial or reputational harm, and to help you minimize the impact to your organization by identifying, detecting, and responding to threats early.
-
Privately Held
6
9
Public Safety
NEW YORK, NEW JERSEY
We can teach you how to Increase Safety and Decrease Danger by bringing you and your organization a unique intervention model that leverages technology and utilizes a multidisciplinary team of experts. Tactical data analysis, cloud-based information awareness, clinical assessment and synthesis of applicable laws is the future of Threat Mitigation and we're enabling those tasked with keeping our society safe to have a cutting-edge advantage.
2015
Privately Held
2
10
Military
Chesapeake, VA
TSO delivers worldwide security, law enforcement, antiterrorism and security force training, specialized high risk/hazardous training, consulting and equipment for the private, commercial and government sectors. Our services range from the “school house” instructional level (introductory, fundamental and basic) to the operational unit level (sustainment and advanced tactics training). TSO is a well-established industry leader in delivery of antiterrorism and security force tactical training and threat mitigation solutions to detect, deter, defend, and defeat terrorism worldwide. Our subject matter experts (SMEs) plan and execute training in maritime antiterrorism/force protection requirements, security force operations, Explosive Ordnance Disposal (EOD), Small Boat (11 Meter Rigid Inflatable Boat (RIB)) fundamentals, handling, and operations training for Department of Defense and Law Enforcement agencies. TSO possesses broad and extensive expertise in the full spectrum of maritime security operations to include: Maritime Interception Operations (MIO), Visit, Board, Search, and Seizure (VBSS), , mission performance validation including Improvised Explosive Device (IED) recognition, security, and safety tactics, techniques, and procedures (TTP). TSO is recognized as a Woman Owned Small Business by Small Business Administration (SBA) and System For Award Management (SAM).
2008
Privately Held
49

Patents

#NumberTitleAbstractDateKindAssigneeInventor
1
10 855 702
Threat mitigation system and method
A computer-implemented method, computer program product and computing system is provided that may be utilized in a threat mitigation system. The method may include displaying initial security-relevant information that includes analytical information. The method may also include allowing a third-party to manipulate the initial security-relevant information with automation information. The method may further include generating revised security-relevant information that includes the automation information.
B2
ReliaQuest Holdings, LLC
Jason Pfeiffer, Joe Partlow, Colin O'Connor, Brian P. Murphy
2
10 643 216
System and methods for dynamic digital threat mitigation
Systems and methods include: receiving digital event type data that define attributes of a digital event type; receiving digital fraud policy that defines a plurality of digital processing protocols; transmitting via a network the digital event data and the digital fraud policy to a remote digital fraud mitigation platform; using the digital event data to configure a first computing node comprising an events data application program interface or an events data computing server to detect digital events that classify as the digital event type; using digital fraud policy to configure a second computing node comprising a decisioning API or a decisioning computing server to automatically evaluate and automatically select one digital event processing outcome of a plurality of digital event processing outcomes that indicates a disposal of the digital events classified as the digital event type; and implementing a digital threat mitigation application process flow that evaluates digital event data.
B2
Sift Science, Inc.
Micah Wylde, Keren Gu, Eugenia Ho, Fred Sadaghiani, Noah Grant
3
10 284 582
System and methods for dynamic digital threat mitigation
Systems and methods include: receiving digital event type data that define attributes of a digital event type; receiving digital fraud policy that defines a plurality of digital processing protocols; transmitting via a network the digital event data and the digital fraud policy to a remote digital fraud mitigation platform; using the digital event data to configure a first computing node comprising an events data application program interface or an events data computing server to detect digital events that classify as the digital event type; using digital fraud policy to configure a second computing node comprising a decisioning API or a decisioning computing server to automatically evaluate and automatically select one digital event processing outcome of a plurality of digital event processing outcomes that indicates a disposal of the digital events classified as the digital event type; and implementing a digital threat mitigation application process flow that evaluates digital event data.
B2
Sift Science, Inc.
Micah Wylde, Keren Gu, Eugenia Ho, Noah Grant, Fred Sadaghiani
4
9 954 879
System and methods for dynamic digital threat mitigation
Systems and methods include: receiving digital event type data that define attributes of a digital event type; receiving digital fraud policy that defines a plurality of digital processing protocols; transmitting via a network the digital event data and the digital fraud policy to a remote digital fraud mitigation platform; using the digital event data to configure a first computing node comprising an events data application program interface or an events data computing server to detect digital events that classify as the digital event type; using digital fraud policy to configure a second computing node comprising a decisioning API or a decisioning computing server to automatically evaluate and automatically select one digital event processing outcome of a plurality of digital event processing outcomes that indicates a disposal of the digital events classified as the digital event type; and implementing a digital threat mitigation application process flow that evaluates digital event data.
B1
Sift Science, Inc.
Eugenia Ho, Keren Gu, Fred Sadaghiani, Noah Grant, Micah Wylde

Patents by Year

Inventors

Assignees

Assignees

Science

Data limited by 2021

Top 10 cited papers

#Paper TitlePaper AbstractAuthorsFields of StudyYearCitation Count
1
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls †
Airports are at the forefront of technological innovation, mainly due to the fact that the number of air travel passengers is exponentially increasing every year. As a result, airports enhance their infrastructure intelligence and evolve as smart facilities to support growth, by offering an enjoyable travel experience. New challenges are coming up, which aviation has to deal with and adapt to, such as the integration of Industrial IoT (Internet of Things) in airport facilities and the increased use of smart devices from travelers and employees. Cybersecurity is becoming a key enabler for safety, which is paramount in the aviation context. Smart airports strive to provide optimal services in a reliable and sustainable manner, by working around the domains of growth, efficiency, safety and security. This article researches: (a) the implementation rate of cybersecurity measures in commercial airports; (b) malicious threats that evolve due to IoT and smart devices installed; (c) risk scenario analysis for IoT malicious attacks with threat mitigation actions. With the aim to enhance operational practices and develop robust cybersecurity governance in smart airports, we present a systematic and comprehensive analysis of malicious attacks in smart airports, to facilitate airport community comprehend risks and proactively act, by implementing cybersecurity best practices and resilience measures.
Medicine, Business, Computer Science
2019
32
2
Be nimble with threat mitigation: lessons learned from the reintroduction of an endangered species
Reintroductions are increasingly being used to restore species and ecosystems. However, chances of successful establishment are often low. Key to improving success is careful consideration of threats, threat mitigation, monitoring, and subsequent improvement to management. We demonstrate this planning, implementation, and review process using the reintroduction of an endangered mesopredator, the eastern quoll Dasyurus viverrinus, in the first attempt to reestablish it in the wild on mainland Australia. In March 2018, 20 captive‐bred quolls (10 male, 10 female) were released into Booderee National Park and monitored via telemetry, camera, and cage trapping. There were many unknowns and, despite thorough consideration of threats, there were surprising outcomes. Within 3 months, 80% of animals had died; half due to predation, an expected threat. Other threats were unexpected yet, due to good monitoring and responsive management, were quickly detected and effective mitigation implemented. These learnings have been incorporated into revised translocation procedures. One year later, four founder quolls remained and had successfully bred. We highlight lessons applicable to other reintroductions. These are, the importance of: (1) conducting a thorough review of threats and implementing appropriate mitigation; (2) targeted monitoring and responsive management; (3) effective communication, education, and engagement with the local community and stakeholders; and (4) ensuring learnings are disseminated and incorporated into future translocation plans. Threat assessment is an important step in identifying potential reasons for failure. However, actual threats can be realized only via experimentation and monitoring. Applying this knowledge to future reintroduction attempts can increase their chance of success.
2019
15
3
“As good as your word”: face-threat mitigation and the use of instructor nonverbal cues on students’ perceptions of digital feedback
ABSTRACT Research has established that students often consider the delivery of instructor feedback to be a face-threatening event. To minimize the potential negative effects of feedback, verbal and nonverbal face-threat mitigation (FTM) strategies are utilized by instructors. Advances in digital feedback systems, like online documents and learning management platforms, allow instructors to add nonverbal elements, such as profile pictures or emojis, to this feedback. Two mixed-method studies were employed to investigate the role of these nonverbal cues in digital feedback. Study 1 (N = 236) employed a 2 by 2 experiment (presence or absence of FTM tactics by presence or absence of instructor picture), showing that FTM strategies have substantial positive impact on feedback and instructor perceptions, and that the inclusion of instructor pictures with this feedback has no effect. Study 2 (N = 218) utilized a 2 by 2 experimental design (presence or absence of FTM tactics by presence or absence of matched-valence emojis). Results confirm main effects of FTM techniques (mitigation strategies lead to positive effects), but the addition of emojis had no perceptible influence. Implications for technology-driven instructional feedback are discussed.
Psychology
2018
12
4
Threat Mitigation, Monitoring and Management Plan - A New Approach in Risk Management
As we are aware that security environment for software system is changing constantly. Due to expanding connectivity and development of complex software systems risk management is posing serious challenges to the designers. This has become all the more difficult as the attackers are no longer random hackers. Their attacks are targeted, purposeful and organized to drive profit. In view of the increasing vulnerabilities and organized attacks by hackers, we are proposing a new approach to counter these new challenges. In our proposed approach named “Threat mitigation, Monitoring and Management Plan”, we have incorporated important features to meet the security risks at the design level itself. As a first step we have adopted multi-layered defense strategy to make the attacker’s job difficult. Furthermore actors have been associated to monitor the proactive strategy of mitigation. These actors will then manage the risk associated with the threat by taking appropriate actions. For better understanding, in our case study we have applied this new approach to mitigate, monitor and manage the threats to an online banking system.
Computer Science
2009
12
5
An Innovative Solution to NASA's NEO Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development
This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (< 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results. Detailed technical descriptions of the study results are provided in a separate final technical report, which can be downloaded from the ADRC website (www.adrc.iastate.edu).
Physics, Geography
2015
11
6
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Machine Learning has revolutionized many fields of computer science. Reinforcement Learning (RL), in particular, stands out as a solution to sequential decision making problems. With the growing complexity of computer networks in the face of new emerging technologies, such as the Internet of Things and the growing complexity of threat vectors, there is a dire need for autonomous network systems. RL is a viable solution for achieving this autonomy. Software-defined Networking (SDN) provides a global network view and programmability of network behaviour, which can be employed for security management. Previous works in RL-based threat mitigation have mostly focused on very specific problems, mostly non-sequential, with ad-hoc solutions. In this paper, we propose ATMoS, a general framework designed to facilitate the rapid design of RL applications for network security management using SDN. We evaluate our framework for implementing RL applications for threat mitigation, by showcasing the use of ATMoS with a Neural Fitted Q-learning agent to mitigate an Advanced Persistent Threat. We present the RL model’s convergence results showing the feasibility of our solution for active threat mitigation.
Computer Science
2020
9
7
Face Threat Mitigation in Feedback: An Examination of Student Feedback Anxiety, Self-Efficacy, and Perceived Emotional Support
This experimental study examined the effects of an instructor’s face threat mitigation tactics on student self-efficacy for learning and perceived emotional support from the instructor in a written feedback setting. Participants (N = 401) were randomly assigned to one of two feedback scenarios in which level of face threat was manipulated. Student feedback anxiety was measured prior to being exposed to the feedback scenario. Results indicate that high face threat mitigation is positively associated with student self-efficacy for learning and perceived emotional support from the instructor. Results also revealed that feedback anxiety predicts lower self-efficacy for learning and less perceived emotional support from the instructor. Implications regarding theory, the measurement of feedback apprehension, and student–instructor communication are discussed.
Psychology
2018
9
8
Performance analysis of an insider threat mitigation model
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.
Computer Science
2008
6
9
An Investigation of Insider Threat Mitigation Based on EEG Signal Classification
This study proposes a scheme to identify insider threats in nuclear facilities through the detection of malicious intentions of potential insiders using subject-wise classification. Based on electroencephalography (EEG) signals, a classification model was developed to identify whether a subject has a malicious intention under scenarios of being forced to become an insider threat. The model also distinguishes insider threat scenarios from everyday conflict scenarios. To support model development, 21-channel EEG signals were measured on 25 healthy subjects, and sets of features were extracted from the time, time–frequency, frequency and nonlinear domains. To select the best use of the available features, automatic selection was performed by random-forest-based algorithms. The k-nearest neighbor, support vector machine with radial kernel, naïve Bayes, and multilayer perceptron algorithms were applied for the classification. By using EEG signals obtained while contemplating becoming an insider threat, the subject-wise model identified malicious intentions with 78.57% accuracy. The model also distinguished insider threat scenarios from everyday conflict scenarios with 93.47% accuracy. These findings could be utilized to support the development of insider threat mitigation systems along with existing trustworthiness assessments in the nuclear industry.
Medicine, Computer Science
2020
4
10
SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise Networks
ACM Reference format: Benedikt Pfaff, Johann Scherer, David Hock, Nicholas Gray, Thomas Zinner, Phuoc Tran-Gia, Raphael Durner, Wolfgang Kellerer, and Claas Lorenz. 2017. SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise Networks. In Proceedings of SIGCOMM Posters and Demos ’17, Los Angeles, CA, USA, August 22–24,2017, 2 pages. https://doi.org/10.1145/3123878.3131970
Computer Science
2017
4

Top 10 cited authors

#AuthorPapers countCitation Count
1
2
135
2
2
135
3
1
122
4
1
122
5
2
63
6
1
53
7
1
53
8
1
53
9
1
53
10
5
50

Science papers by Year

Clinical Trials

  • Researches Count 0
  • Ongoing Studies 0
  • Total Enrollment

Trends

#LinkTrendsRank
1
558 860

Use Cases

#TopicPaper TitleYearFields of studyCitationsUse CaseAuthors
1
Threat Mitigation
Threat Mitigation for the Root Server System
2019
0
the root server system
2
Threat Mitigation
Modelling Control and Cyber Threat Mitigation for Nonlinear Physical Systems in Real Time Operating System Environment
2018
Engineering, Computer Science
0
nonlinear physical systems in real time operating system environment
3
Threat Mitigation
Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
2017
Computer Science
0
rogue devices, privilege escalation, and risk-based vulnerability and patch management
4
Threat Mitigation
SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise Networks
2017
Computer Science
4
enterprise networks
5
Threat Mitigation
Vulnerability Analysis and Threat Mitigation for Secure Web Application Development
2012
Engineering, Computer Science
4
secure web application development
6
Threat Mitigation
The evolving science of terrorist threat mitigation for bridges
2010
0
bridges

Case Studies

#TitleDescriptionPDFYearSource Ranking
1
Case Study on the Insider Threat Mitigation at Nuclear Facilities
The international community, including the IAEA, defines that the malicious behavior of insiders at nuclear power plants is the most fatal illegal activity ...Case Study on the Insider Threat Mitigation at Nuclear Facilitieshttps://www.kns.org › files › pre_paperhttps://www.kns.org › files › pre_paperPDF
yes
20
2
Case study: Threat assessment and risk mitigation - KZbin
The third part of a case study of the CTSC risk assessment. This video talks about making threat assessments and performing risk mitigation. Пікірлер ...
no
10
3
Case study: Threat assessment and risk mitigation - kzits.info
Culkin Cracks Up The Web With His Own Version Of 'Home Alone' · Privacy Impact Assessment. 7:26. Privacy Impact Assessment. databrackets. Рет қаралды 1,1 М.
no
10
4
COVID19 Threat Mitigation Virtual Table Top: Case Study
18-Feb-2020 — A Continuity of Business Operations. Tabletop Exercise Case Study with a Customizable Template by Jeff Spears, COO.(function(){var frtImages=true;var eid='z9PoV';(function(){var a=frtImages,b=Date.now();if(google.timers&&google.timers.load.t){var c=window.innerHeight||document.documentElement.clientHeight,d=0;if(eid){var e=document.getElementById(eid);e&&(d=Math.floor(e.getBoundingClientRect().top+window.pageYOffset))}google.tick("load","frt",b);d&&(google.c.e("load","frtp",String(d)),google.c.e("load","wh",String(Math.floor(c))));for(var f=d>=c,g=document.getElementsByTagName("img"),h=0,k=void 0;k=g[h++];)google.c.setup(k,a,d);google.c.frt=!1;f&&google.c.ubr(!1,b,d)};}).call(this);})();
no
0
5
Mitigating social media threats towards information security : a case ...
This together with the continuous increase in internet speed gave rise to the formation of interactive online communication channels, such as Social Media (SM).
no
100

Experts

Twitter

#NameDescriptionFollowersFollowingLocation
1
Semperis
Identity-driven cyber resilience and threat mitigation platform for cross-cloud and hybrid environments.
8 304
320
Hoboken, NJ
2
Matt Schroeder
Senior researcher, @SmallArmsSurvey, covering arms trafficking, illicit weapons (incl MANPADS), and conventional weapons threat mitigation. @dallascowboys fan.
5 314
619
-
3
Inkerman Insights
The Inkerman Group is an international business risk, intelligence and investigation consultancy, which takes an intelligence-led approach to threat mitigation.
3 051
1 174
Global
4
H L U
Managing Director - Consultancy Agency. Advice on: Airline Ground Operations, Transportation Security, Insider Threat Mitigation. Likes Flying&Travel.
1 019
3 707
Belgium
5
Brad Goldberg, MD
Pediatric Emergency Medicine Physician 🚨 Disaster Management and Threat Mitigation 💥 Special Pathogens Programs 🦠 🏥 🌡 😷 Founding Member of @BeetsDAO 🎧 🎶
632
423
Los Angeles, CA
6
Joe Lefoe
Cybersecurity Investigator. A strong interest in Cyber-security, Threat Mitigation and keeping my finger on the pulse of I.T. news. Opinions are my own.
438
783
Wollongong, Australia
7
Marc Alexander CBCI
Regional Security Program Manager for EMEA at Microsoft. Providing Cyber security, Vulnerability threat mitigation advice and Incident Response comms.
424
352
Swindon, England

Youtube Channels

#NameDescriptionReg DateViewsCountry
1
We share with our viewers videos related to security, counter terrorism and intelligence. We also share videos from some of the training programs Chameleon Associates provide to government and corporate clients all over the world. https://chameleonassociates.com Chameleon Associates provides Security Training programs and Security Consulting Services to the public, private, military and law enforcement sectors. We are a recognized name in the industry and offer specialized security knowledge and expertise gained in the field. From our offices in Australia, Europe, Singapore and the U.S. we support clients worldwide. Our mission is to continue to help those clients find threat mitigation solutions, reduce their risk and make knowledgeable security decisions.
Fri, 16 Jan 2015
126 392
2
The goal of Apex Security Consultants is to provide clients with professional-grade security consultations. We specialize in threat mitigation and threat risk analysis.
Sat, 28 Dec 2019
30 645
United States