by Joey Alonso | Nov 10, 2016 | Assessments, Blog, Foreign Threats, Human Resources, In-depth Vulnerability Assessments, Information Technology, Infrastructure, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, Physical Security, Privacy, Security Awareness, Threats, Trusted Business Partners
It goes without saying that any company wanting to become a leader in anything that involves the term “Global” must do business with Chinese companies. I’ve heard the actual business discussions and agreements normally go quite well but my comments here are simply to...
by Joey Alonso | Nov 4, 2016 | Assessments, Blog, Foreign Threats, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Physical Security, Security Awareness, Services, Threats, Trusted Business Partners
A recent LA Times article on Chinese Economic Espionage prompted me to post this quick note on a sunny Friday afternoon. Have a great weekend! During my time at the FBI, where my team developed easy to digest Intelligence products to support Field...
by Joey Alonso | Nov 2, 2016 | Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Foreign Threats, Human Resources, In-depth Vulnerability Assessments, Information Technology, Infrastructure, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Physical Security, Security Awareness, Services, Threats, Trusted Business Partners
I read the below article while enjoying a cup of morning Joe, remembering a conversation I had just a week ago. So, I thought, before the house gets crazy with kids getting ready for school, I could pass along my thoughts on energy infrastructure and SCADA. For many...
by Joey Alonso | Oct 24, 2016 | Blog, Cyber Forensics, Foreign Threats, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Mobile Security, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Threats, Trusted Business Partners
I have a little bit of previous insight into the threats posed using foreign designed and built equipment, most of which can’t be shared with the general public. A few months ago, I was interviewed by the Editor of Supply Chain and Demand Executive Magazine, where I...