How Will the Department of Government Efficiency (DOGE) Impact GovCon? 

Today, President Donald Trump was sworn in for a second, nonconsecutive term after the historic November 2024 election. As highlighted on the campaign trail, Trump’s Administration will bring with it an unprecedented challenge to the status quo of government operations, inviting important discussions about government size, efficiency and efficacy. Prior to taking office, Mr. Trump […]

Executive Protection: Ben Joelson Speaks with CNBC

Chertoff Group Principal and Head of Security Risk & Resilience Ben Joelson spoke with CNBC reporter Bertha Coombs about how corporate security leaders are reconsidering their priorities in the wake of the shooting of United Healthcare CEO Brian Thompson.

Salt Typhoon Amplifies Why End-to-End Encryption is Essential

Introduction Adam Isles and Andreas Kurland from our Cybersecurity team discuss the infiltrations of the Salt Typhoon security breach with the CISO Tradecraft podcast. As the U.S. government reveals that intrusions into telecom companies are deeper, more wide-spread and more severe than previously known, it is essential to incorporate end-to-end encryption into communication methods. What […]

Eliminating Foreign Influence in Federal Contracting 

In an age of amplified global tensions and heightened cybersecurity threats, the U.S. government has sharpened its focus on potential foreign influence in the federal contracting space. For contractors planning to acquire and maintain government business, understanding and preparing for this increased scrutiny is no longer optional—it’s a necessity.

Chad Sweet Speaks about Election Interference at Columbia

As the November presidential election approaches, American intelligence officials are warning of escalating foreign interference efforts by adversaries seeking to undermine trust in democratic institutions and influence U.S. politics.

Recent China-Based Cyber Attacks Highlight U.S. Tech Vulnerability

China’s aggressive operations to infiltrate the United States’ networks pose a significant security threat to the Nation’s critical infrastructure. China backed attacks, often referred to as Typhoon attacks, have focused on the US technology sector, targeting multiple layers of network infrastructure.  

Mapping the Cuckoo’s Egg

Using MITRE’s catalogued techniques, we can explain to a non-technical audience how these concepts apply today, demonstrating that foundational security principles from as far back as 1986 are still relevant.

Our goal is to provide a solution tailored to your needs. Contact us today for a consultation. 

How can we help?

Fill out the information below. Provide as much detail and a team member will respond as soon as possible.