• DeepBlue2020 Vanguard
COVID-19: The Pandemic, Grey Zones, and Security Vulnerability
Mar31

COVID-19: The Pandemic, Grey Zones, and Security Vulnerability

COVID-19 is affecting all facets of society today and life as we know it. This pandemic is creating havoc around the world and is being used by threat actors to perpetrate grey zones actions and to infiltrate security vulnerabilities. In this episode of Vanguard Radio, J. Richard Jones talks with Valarie Findlay, American Society for Evidenced-Based Policing member and...

Read More
Strong, Secure, Engaged: Canada’s Cybersecurity and Cyber Defence Update
Feb06

Strong, Secure, Engaged: Canada’s Cybersecurity and Cyber Defence Update

Conflict and warfare have seen drastic changes in recent decades, mostly due to globalization, technology and geo-political and economic power shifts. Affecting more than just strategies, tactics and equipment, who and how they engage and behave in conflict and what they employ have moved far outside of the conventions and treaties most nations adhere to in time of war....

Read More
Insider Threats, Informants and Whistleblowers: Different Animals, Same Stripes?
Dec18

Insider Threats, Informants and Whistleblowers: Different Animals, Same Stripes?

Along with Atomic Blonde and Kraftidioten, one of my all-time favourite movies is The Informant! A brilliant biographical-comedy, The Informant! is based on one of the biggest anti-trust cases in US history involving executives from one of the largest corporations at the time, Archer Daniels Midland (ADM). The true story of Mark Whitacre, a young executive at ADM, the...

Read More
Spies Among Us: Are We Blind To Insider Threats?
Sep27

Spies Among Us: Are We Blind To Insider Threats?

Playing out almost daily, the world’s most impactful nations masterfully engage in various tactics, like sanctions, tariffs, and detainments, for the advancement of greater strategic goals. Like chess moves, they can be predictable and emerge from a well-worn political playbook and at other times they come out of the left-field, often leaving the opposing nation stuck between their agenda...

Read More
The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology
Mar07

The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology

Fluid, agile and accessible – the malicious use of technology can range from simple, uncoordinated attacks to complex, highly coordinated persistence. Figuring as tool in the commission of a crime or as a delivery system to exploit many vectors, ‘technology for bad’ is not new, but what we have seen recently is – and it’s troubling. When mixed with...

Read More
Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity
Feb26

Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity

Whether it is a malicious attack or an inadvertent release on protected or classified data, a breach of government data can level a severe blow to integrity and reputation, leading to legal and legislative consequences that impact partners, allies and the public. For those reasons, cybersecurity and privacy practices for the protection of electronic information go hand-in-hand. The verification...

Read More
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube