The Intelligence Corner

Our experts’ unique discoveries, observations, and opinions on what’s trending today in Business Risk Intelligence and the Deep & Dark Web.

Search results
Posts of Chris Camacho

Three Tips for Combating Fraud

August 6, 2018

Fraud is an inevitability of business, and one that most won’t concede they’re susceptible to. But the blunt truth is, insiders who are close to critical systems—or outsiders who are skilled enough to exploit vulnerabilities in anti-fraud and other security controls—will steal. They may target assets they’re entrusted to protect or cook the books to […]

Read more

Flashpoint at Black Hat USA 2018

July 2, 2018

As someone who has been attending Black Hat USA for more than 15 years, I can attest to the tremendously valuable experience the conference provides for security vendors, decision-makers, and end-users alike. Here’s why I continue to attend: The Collaborative Atmosphere Black Hat is one of the largest and most popular security events in the […]

Read more

Enhancing Business Risk Intelligence with Information Sharing

June 28, 2018

Throughout my career in security and intelligence, I’ve come to recognize that information sharing is, in many ways, like exercise or flossing. We all know we should be doing it, but many of us don’t. Concerns over trust, privacy, and value continue to limit or prevent many organizations from sharing information about incidents, yet these […]

Read more

Business Risk Profile: Pharmaceuticals

March 21, 2018

Companies in the innovation-driven pharmaceutical industry are no strangers to risk. Operational risk is an inherent aspect of pharmaceutical research and development, with 4.9 percent of new drugs making it from first toxicity dose to final market approval. Pharmaceutical companies also face financial and strategic risks when bringing new drugs to market, as well as […]

Read more

Business Risk Profile: Hospitality

March 20, 2018

From restaurants and nightlife venues to hotels and tourist attractions, hospitality companies play a crucial role in economies worldwide while providing space for leisure activities, entertainment, socialization, and travel. The hospitality industry has been around for more than a thousand years, continually adapting to societal and technological development. In the past 20 years, hotels, for […]

Read more

Business Risk Profile: Manufacturing

February 6, 2018

As a critical infrastructure sector, the manufacturing industry is a primary driver of economic development and growth, enabling everything from local utility services to global trade. The critical importance of manufactured goods in modern society means a successful attack against a major manufacturer could trigger a domino effect, leading to widespread economic disruption across supply […]

Read more

Business Risk Profile: Transportation

January 10, 2018

If the telecommunications sector is the central nervous system of the global economy, then the transportation sector is its circulatory system. Each day, transportation operators move millions of passengers and tons of freight by air, rail, road, and sea. The sheer scale, scope, and critical nature of transportation services exposes operators to a variety of […]

Read more

Business Risk Profile: Third-Party Risk

December 20, 2017

There are many strategic advantages to outsourcing, from cost optimization to having an increased focus on an organization’s core competencies. However, entrusting third-party vendors, contractors, or partners with access to internal systems and data can expose organizations to certain risks. In the event that a security incident or breach of a third party inadvertently jeopardizes […]

Read more

Business Risk Profile: Insurance

December 12, 2017

The insurance industry plays a unique role in modern society, providing individuals and organizations with a sense of financial security when faced with unforeseen circumstances. Unfortunately, the insurance industry is also unique in how and why it is susceptible to fraud, phishing, ransomware, credential theft, and other cyber threats. Indeed, many of these threats have […]

Read more