Posts by author: TAL Global

TAL Global has been selected by the City of Inglewood, California to assess the safety and security of the proposed $1.86-billion NFL stadium.

Continue Reading

Dr. Erroll Southers, TAL Global’s Managing Director, Counter-Terrorism & Infrastructure Protection, and Director of Transition and Research Deployment at the Department of Homeland Security National Center for Risk and Economic Analysis of Terrorism Events (CREATE), opened a panel debate hosted by Rep. Karen Bass at the Culver City Senior Center, in Culver City, CA on the President’s request for the Authorization for Use of Military Force (AUMF) against the self-declared Islamic State (also called ISIL, or ISIS).

Continue Reading

With the significant and regular exposure Anonymous is getting, it is easy to make the mistake of assuming that most cyber attacks are motivated by ideology (including hacktivism and cyber espionage).

Continue Reading

Webcams in the workplace have become so ubiquitous that we don’t really pay attention to them anymore, just like we don’t pay attention to computer keyboards and monitors. Yet webcams can, and have, become a serious threat to privacy, confidentiality and intellectual property. They can be hijacked by hackers, criminals and cyber creeps, and they can be used to commit a variety of offenses, from invasion of privacy to blackmail, theft and industrial espionage. A nanny in Texas recently discovered that the baby monitor she’d used was actually under the control of a cyber Peeping Tom.

Continue Reading

Professor Raphael Bostic, the director of the USC Bedrosian Center on Governance, at the USC Price School of Public Policy recently interviewed Dr. Erroll Southers, the Director of Transition and Research Deployment for the USC Center for Risk and Economic Analysis of Terrorism Events (CREATE), about the Paris massacre and its ramifications for the world at large and for the US in particular.

Continue Reading

There are a great many pundits at work purporting to analyze the significance of the hack on The US Central Command (CENTCOM)’s Twitter account. This was not a highly orchestrated and technical attack, but an attack directed at a consumer social network. The real message is not that ISIS has a great cyber force, but that the consumerisation of the workplace can lead to serious unwanted consequences.

Continue Reading

KIM Jong Un and You

December 19, 2014 by

A series of cyber attacks attributed to the Hermit Kingdom also known as the Democratic People’s Republic of Korean (DPRK) and more commonly called North Korea, has caused Sony Pictures to cancel the release of their new ‘comedy’ “The Interview”. The film is based on a fictional scenario wherein the CIA recruits an American TV personality to kill the ruler of North Korea.

What does all this mean to you?

Continue Reading

Criminals, including those in the cyber realm, also come in many stripes. Some are motivated by greed, while others, such as terrorists, are driven by beliefs and ideologies. Aviation is a prime target for both types of criminals and involves threats from both as well as potential threats from nation states in time of war.
Lawrence Dietz, TAL Global’s General Counsel and Managing Director, Information Security, provides here an insightful introduction to the unique and challenging nature of cyber security in the aviation sector.

Continue Reading

Dr. Erroll Southers, TAL Global’s Managing Director, Counter-Terrorism & Infrastructure Protection, and the Director of Transition & Research Deployment at the Department of Homeland Security National Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California (USC) – a widely recognized international terrorism expert and author, shed recently light on the prominence of ISIL terrorist organization in Iraq and Syria, and explained why its message resonates with “frightening” success both globally and in the United States.

Continue Reading

The FBI and DHS published recently a warning that “disgruntled and former employees pose a significant cyber threat to US businesses due to their authorized access to sensitive information and the networks businesses rely on”.

Continue Reading