Knowledge Center

Doom-scrolling on the internet for several minutes can lead you to worst case scenarios of nefarious drone use with weaponized payloads, crushing cyber-attacks and enemy surveillance activities endangering everything from private citizens to national security.


It is expected that commercial and hobby level drone sales will rise from 2.5M in 2016 to over 7M in 2020 according to the according to the Cyber Security and Infrastructure Security (CISA) of DHS. As a result, potential threats associated with the licit or illicit usage of Unmanned Aerial Systems (UAS) or Unmanned Aerial Vehicles (UAV) will continue to increase in the coming years. Because of their physical and operational characteristics, drones can often evade sight detection and create numerous safety and security challenges for public and private organizations.


While there has been a significant amount of progress in efforts to support the safe consumer and commercial operation of drones in recent years, there remains a growing security and safety concern for intent and use of the operators behind them.


Learn More About Assessing Your Risk

With the advent of Continuous Evaluation (CE) and the resulting overhaul of the Defense Department’s personnel vetting process for suitability, credentialing and security clearance processing program underway, the Defense Industrial Base (DIB) can expect many benefits with a few new challenges.


Learn More About Continuous Evaluation

Increased regulatory scrutiny of a contractor’s supply chain is a critical element of the new comprehensive security assessment paradigm. This involves addressing the multiple vulnerabilities that can be introduced by partners and vendors. It is more important than ever to review each facet of your security program. When vetting partners and vendors, it is important to have tailored evaluation standards that can vary based on the nature of products/services, as well as potential risk. Further, the risk assessment process should be extensive enough to identify and cultivate potential synergies across your security program.


Learn More About Delivering Uncompromised

How do you safeguard assets in a manufacturing environment when your business operations intentionally elevate fire hazards that could burn it down every day?


Learn More About Outsourcing Fire Services

Sourcing physical security service providers has gotten more and less technical. While there is much time spent on cost comparison, technical acceptability, technology offerings and efficiency schemes, one of the most commonly overlooked aspects is a professional transition plan.


Learn More About Best Practices for Managing a Service Transition

Outsourcing industrial physical security services has long been recognized as an effective cost management strategy for prime contractors. Labor is expensive; so service contracts tend to be large targets for procurement professionals to focus on for cost savings efforts. While a competitive marketplace is healthy for all parties, an over reliance on LPTA (Lowest Price Technically Acceptable) bidding can introduce risk in the supply chain and overall significantly impact the buyer’s contract performance.


Learn More About Outsourcing Industrial Security Successfully

Failing to adequately train armed security personnel may have significant consequences for an organization and/or their security supplier. During a ten-year study (East Carolina University) on civil litigation filed against police agencies that allege a failure to train, it was found that law enforcement agencies prevailed slightly less than 70% of the time and 55% of the claims were from non-lethal encounters. Private security does not have the same specific legal protections afforded to law enforcement agencies or their personnel. Most security companies fail to provide suitable firearms training and rely only on the operating state’s minimum standards as their legal defense. It’s imperative that private security lead the way in the development of professional armed training programs while adhering to and exceeding the prescribed minimums determined by each state.


Learn More About Best Practices for Armed Training Programs

Social and political demonstrations targeted at private company facilities can be disrupting and costly. While it’s important for security professionals to be prepared to address against these organized and ill intended disturbances, first amendment audits typically only involve one or several people overtly photographing and/or filming a government or private business facilities with the intention of instigating an unfavorable interaction with security personnel. The video results are then posted to the web and often are widely viewed leading to reputation and personal damages.


Learn More About First Amendment Audits