Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean TSCM - The Other Covid Deep Clean (.pdf version) Deep Clean sanitization of offices and…Kevin D. MurrayJanuary 10, 2021
Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Would You Make a Good Spy? Test yourself for fun. Learn what makes a good…Kevin D. MurrayJanuary 9, 2021
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables Malicious USB Cables - Definition (PDF version) A malicious cable is any cable (electrical or…Kevin D. MurraySeptember 19, 2020
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Weird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? (The audience remains silent.) They…Kevin D. MurrayAugust 18, 2020
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (USB Spy Cable Detector Instructions PDF) These are key measurements for identifying malicious spy cables.…Kevin D. MurrayJune 21, 2020
EspionageFutureWatchHistorical FutureWatch: Demise of the Old-Time Spies FutureWatch: Demise of the Old-Time Spies Not so long ago, old-time spy Secret Agent Man…Kevin D. MurrayJanuary 7, 2020
Corporate SecurityEspionage Trade Secret Protection Best Practices Trade secret protection is essential for two reasons. Instituting trade secret protection best practices reduces…Kevin D. MurrayMarch 26, 2019
Corporate SecurityEspionageHistorical Business Espionage – A Cunning Plan to Protect the U.S. Business Espionage: Headline news for decades now. We are bombarded with news stories and court…Kevin D. MurrayJanuary 31, 2019
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Information Security v. Spies Evolution & Solution Evolution of the Spy Generation Spying as a…Kevin D. MurrayJanuary 5, 2019
Corporate SecurityEspionageHistoricalTSCM Laser Beam Eavesdropping – Sci-Fi Bugs? Laser Beam Eavesdropping – Si-Fi Bugs? (pdf version) Back in 1988, newspaper reports about laser…Kevin D. MurrayJanuary 4, 2019
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important —Get to know the spy clues. From businesses to governments, and…Kevin D. MurrayJune 4, 2018
Corporate SecurityCybersecurityEspionage USB Stick Warnings Before we jump into the USB memory security recommendations, a little background is in order...…Kevin D. MurrayMay 16, 2018
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Economic espionage,…Kevin D. MurrayMarch 13, 2018
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayMarch 13, 2018
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayMarch 13, 2018
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayNovember 15, 2017
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been in your life forever. Remember your very first real economic espionage…Kevin D. MurrayOctober 15, 2017
Espionage Business Espionage: The Employee Competitor… and what to do about it Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this... “I think…Kevin D. MurrayMarch 15, 2017