March, 2017

The Terror Attack in London – Expect More of the Same in Europe and US as ISIS Loses its Grip?

Professor Erroll Southers, USC’s Director of Homegrown Violent Extremism (HVE) Program, and Managing Director of TAL Global’s Managing Director, Counter-Terrorism & Infrastructure Protection, discussing the recent London terror attack.
March, 2017

Undercover Workplace Investigation – The Quiet Way to Preempt and Mitigate

Undercover workplace investigation is an effective way to deal with multiple workplace challenges. Read more about undercover investigations benefits, vulnerabilities and services.
March, 2017

Workplace Investigations: Avoid Mistakes, Get Results

Workplace investigations can help your organization, but they can hurt it too: our seasoned experts will help you maximize the benefits and avoid painful pitfalls
March, 2017

New Cal/OSHA Workplace Violence Rules for Health Care Facilities

All you need to know about the new Cal/OSHA Workplace Violence Rules for Health Care Facilities order, effective from January 2017.
March, 2017

Violence Threats to Italian Iconic Landmarks and Stadiums

Italy's landmark and sport stadiums are recent targets of threats of violence and terrorism . Read more about Italy's external and internal threats to its iconic landmarks and stadiums...
February, 2017

Defending Against Business E-mail Compromise (BEC) and Ransomware

Businesses and individuals find themselves increasingly threatened by ever more […]
February, 2017

Using “Assertive HonoringTM” Method to Expand Your Healthcare Facility Conflict De-escalation Toolbox

Learn how to use “Assertive Honoring” to expand your conflict management and conflict de-escalation toolbox in healthcare facilities.
February, 2017

Five Ways to Select the Best Investigative Service

How do you select an investigative service for your organization? Here are five ways to ensure that you choose the best investigative partner.
February, 2017

How to Choose the Best Executive Protection Service

Selecting an executive protection (EP) service may be one of the most critical decisions in an executive’s career. How do you choose the best executive protection service?
February, 2017

IoT and SCADA Breaches: Lessons Learned & Case Studies

Lawrence Dietz, TAL Global’s General Counsel and Managing Director of Information Security, TAL Global Corporation, will be the facilitator of a Peer-to-Peer presentation titled "IoT and SCADA Breaches: Lessons Learned & Case Studies", at the RSA Conference at the RSA Conference 2017, February 14, Moscone Center, San Francisco, CA, USA. February 14, 2017 1:15 PM - 2:00 PM.
January, 2017

Fraud Alert! Film Industry Professionals

A fraud scam is being perpetrated on film industry professionals by a group of fraudsters, posing as Huaxia Film Distribution, a legitimate company.
February, 2017

Defending Against Business E-mail Compromise (BEC) and Ransomware

Businesses and individuals find themselves increasingly threatened by ever more […]
February, 2017

IoT and SCADA Breaches: Lessons Learned & Case Studies

Lawrence Dietz, TAL Global’s General Counsel and Managing Director of Information Security, TAL Global Corporation, will be the facilitator of a Peer-to-Peer presentation titled "IoT and SCADA Breaches: Lessons Learned & Case Studies", at the RSA Conference at the RSA Conference 2017, February 14, Moscone Center, San Francisco, CA, USA. February 14, 2017 1:15 PM - 2:00 PM.
January, 2017

Fraud Alert! Film Industry Professionals

A fraud scam is being perpetrated on film industry professionals by a group of fraudsters, posing as Huaxia Film Distribution, a legitimate company.
November, 2016

The Recent Massive Internet Attack: What does it mean to you and what should you do about it?

The attack was executed by a botnet, called Mirai which is a collection of ‘captive’ devices, such as webcams and baby monitors. The botnet generated by tens of millions of IP addresses overloaded the system resulting in the massive outage.
June, 2016

What Does Gartner, Inc. Think about Cyber Security, and Why Should It Matter To You?

Gideon Gartner, a former financial analyst of the Gartner, Inc. revealed its “Top Security Predictions 2016”
March, 2016

Apple, The FBI and You

Recently, the US Federal government (in this case represented by the FBI) asked Apple Corporation to help them ‘crack’ the password of one of the iPhones used by a shooter in the December 2015 attack in San Bernadino attack where 14 people were killed and another 21 injured. Lawrence Dietz, Esq, TAL Global's General Counsel and Managing Director, Information Security, examines the background, reasons and ramifications of the recent clash between the two powerful organizations.
October, 2015

Safe Harbor: The TAL Global Perspective

The European Union Court of Justice issued a judgment on October 6, 2015 which declared the Safe Harbor Framework as invalid. While the long term effects of this ruling are far from clear, organizations that are doing business within the EU and those that are storing data about EU citizens and organizations need to be proactive to minimize the likelihood of problems with their international operations.
September, 2015

Harnessing Ancient and Modern Writings to Protect Your Company’s Confidential Information

Knowing yourself is, indeed, a core requirement for any organization to protect its sensitive information and intellectual property. This is also the core motive in Naomi Fine’s book: Positively Confidential: 10 Proven Steps to Protecting Confidential Information, Private Data, and Intellectual Property in Today’s Interactive Business World.
August, 2015

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

The new NIST Special Publication 800-171 may offer organizations some good insight and guidance as to how to protect their sensitive information including Personally Identifiable Information (PII), Payment Card Industry (PCI), Personal Health Information (PHI), trade secrets and more.
June, 2015

Cyber Bullying and Revenge Porn in the Workplace

On June 16, 2015, Larry Dietz, Esq., TAL Global's General Counsel and Managing Director, Information Security, gave a presentation at the Cornerstones of Trust Conference, in Foster City, CA, titled: Cyber Bullying and Revenge Porn in the Workplace.