How Will the Department of Government Efficiency (DOGE) Impact GovCon?

Today, President Donald Trump was sworn in for a second, nonconsecutive term after the historic November 2024 election. As highlighted on the campaign trail, Trump’s Administration will bring with it an unprecedented challenge to the status quo of government operations, inviting important discussions about government size, efficiency and efficacy. Prior to taking office, Mr. Trump […]
Executive Protection: Ben Joelson Speaks with CNBC

Chertoff Group Principal and Head of Security Risk & Resilience Ben Joelson spoke with CNBC reporter Bertha Coombs about how corporate security leaders are reconsidering their priorities in the wake of the shooting of United Healthcare CEO Brian Thompson.
Salt Typhoon Amplifies Why End-to-End Encryption is Essential

Introduction Adam Isles and Andreas Kurland from our Cybersecurity team discuss the infiltrations of the Salt Typhoon security breach with the CISO Tradecraft podcast. As the U.S. government reveals that intrusions into telecom companies are deeper, more wide-spread and more severe than previously known, it is essential to incorporate end-to-end encryption into communication methods. What […]
Eliminating Foreign Influence in Federal Contracting

In an age of amplified global tensions and heightened cybersecurity threats, the U.S. government has sharpened its focus on potential foreign influence in the federal contracting space. For contractors planning to acquire and maintain government business, understanding and preparing for this increased scrutiny is no longer optional—it’s a necessity.
Chad Sweet Speaks about Election Interference at Columbia

As the November presidential election approaches, American intelligence officials are warning of escalating foreign interference efforts by adversaries seeking to undermine trust in democratic institutions and influence U.S. politics.
Recent China-Based Cyber Attacks Highlight U.S. Tech Vulnerability

China’s aggressive operations to infiltrate the United States’ networks pose a significant security threat to the Nation’s critical infrastructure. China backed attacks, often referred to as Typhoon attacks, have focused on the US technology sector, targeting multiple layers of network infrastructure.
Mapping the Cuckoo’s Egg

Using MITRE’s catalogued techniques, we can explain to a non-technical audience how these concepts apply today, demonstrating that foundational security principles from as far back as 1986 are still relevant.
Chad Sweet on CNBC: Pager and Radio Supply Chain Attack

Chertoff Group CEO and Co-Founder Chad Sweet joined CNBC’s ‘Power Lunch’ on September 20 to discuss how last week pager blast in the Middle East was carried out, the potential impact for U.S. companies and more.
Aaron Roth Discusses Hurricane Risk to Oil Tankers

Aaron Roth discusses the risk of hurricanes to oil tankers and the best ways the vessels adn crews can stay safe.
Ben Joelson Explores How AI Will Improve OSINT

AI will create efficiencies for corporate security teams who use OSINT to proactively monitor social media and other online sources for signs and signals of potential harm.