Skip to content
Sitemap
Posts
Pages
Case Studies
Resources
-
Protect Your Business: Unveiling the Top Physical Security Threats to the Telecom Industry
-
Rare Earth Elements (REEs): Essential Resources, Global Supply Challenges, and Future Prospects
-
Protected: Episode 1 – Modern China: What are the changing risks to doing business?
-
Panama Protests: Balancing Profits and Environmental Concerns – The Controversial Mining Contract
-
Xi Jinping and the 20th Party Congress: Chinese politics and geopolitics in 2022
-
Greece protests: university police become operational
-
What are the threats to your NGO? How to use threat intelligence for your risk assessment
-
Evaluating the EU’s stance towards the Israel-Palestine conflict
-
The surging violent crime rate in Ecuador: gang killings, drug trafficking and Mexican cartels
-
Yevgeny Prigozhin death: The likely implications of the Wagner Group plane crash
-
Israel-Palestine conflict update: What’s happening and what comes next
-
Afghanistan and the Taliban Takeover: What happens next?
-
Iran attacks Israel: What comes next?
-
Russia-Ukraine Conflict Summary: What’s happening in Ukraine?
-
Brazil election 2022: Polarisation and security concerns after first round results
-
Unrest in France: Understanding the Causes and Consequences of the Ongoing Riots
-
Strategic Implications of Israeli Airstrikes
-
The Rise of Nation State Cyber Attacks and the Threat to Business
-
Preparing for protests with threat intelligence
-
Unifying Security and Risk in the Manufacturing Industry
-
The 2021 Myanmar Coup: What happened?
-
Manipur Violence: Ethnic clashes, riots and killings
-
Iranian strikes on Israel: What’s next?
-
What are the Implications of South Africa’s 2024 Elections?
-
Sign-up: 2024 Business Threat Predictions
-
Security Challenges at the India-Pakistan Border: How are Chinese drones being used for Arms and Drugs Trafficking?
-
The Russia-Ukraine Donbass conflict and the threats to the oil and gas industry
-
2024 Business Threat Predictions
-
2021 Myanmar Coup Protests: Myanmar’s Civil Disobedience Movement
-
Exploring Port Security Threats in South and Latin America
-
Fuel protests in Europe: The climate and energy crises and two conflicting protest movements
-
Protected: Episode 2 – China’s manufacturing industry: Post-COVID, what are the risks to business?
-
Will Ukraine join NATO? Analysing proposals to protect Ukraine from future aggression
-
The Future of Mining: A Review of the Threat Landscape
-
Protected: Episode 3 – Does China’s political climate pose a risk to business interests?
-
What is the impact of load shedding in South Africa?
-
Protected: Episode 4 – China’s military build-up and US-China competition: Should businesses be concerned?
-
Tracking armed conflict using threat intelligence software
-
How to tailor data with a threat intelligence API?
-
The Best Open Source Intelligence (OSINT) Tools
-
How to set up a mining operation using threat intelligence
-
Learn how security consultants are using threat intelligence to better protect their clients
-
Political Unrest in France: Analyst Insight
-
What’s driving the protests and unrest in South Africa?
-
What’s happening in Afghanistan? The last seven days and current situation
-
The increasingly violent insurgency in West Papua
-
2020 US Election: What is happening and how does it impact you?
-
How will the upcoming winter change the course of the Russia-Ukraine conflict?
-
Analysis: The Proud Boys and Right-Wing Extremism in the United States
-
The Effects of China’s Belt and Road Initiative in Myanmar
-
How to build an effective threat intelligence program
-
Fuel shortages and the global food crisis of 2022
-
Adding speed to your threat intelligence feed
-
The changing nature of conflict
-
Threats to the Oil and Gas Industry in the Gulf of Mexico
-
Mining’s ESG Risks: What Should You Be Tracking and Why?
-
Israel-Iran: What next?
-
Threat Assessment: Antifa in Portland and Seattle
-
Power shifts and pipeline dreams: Navigating economic cooperation between the Taliban’s Afghanistan and Central Asia
-
Threat Assessment: Black Lives Matter
-
Capacity of the Afghan Security Forces during the US Withdrawal
-
The rise of Sweden as Europe’s gun crime capital
-
The 5 biggest challenges facing oil and gas in 2022
-
AI vs. Human Analysis: Threat Intelligence Reporting
-
Power and Consequences: What is the Reality of Lithium Mining in South America?
-
The fourth wave fentanyl crisis in the U.S.
-
Insurgency in Mozambique: Oil and Gas under threat?
-
Uganda-Tanzania oil pipeline: Security threats facing the EACOP
-
Integrating AI Chatbots in the Open Source Intelligence Cycle – ChatGPT for OSINT
-
Border Tensions – A Review of the Venezuela and Guyana Conflict in the Essequibo Region
-
5 Biggest Threats to Energy Companies in 2023
-
How will South Korea’s new President respond to North Korea’s weapons programme?
-
Webinar Follow-up: What security professionals in the humanitarian aid and development sector should expect
-
Ready to learn more about the Report Your Own Incidents feature?
-
What is Iran’s plan for Afghanistan under Taliban rule?
-
Security outlook for crime and violence in Medellin for 2022
-
How to use Telegram as an open-source intelligence tool
-
How to use Telegram as an open-source intelligence tool
-
Preparing for protests with threat intelligence
-
Illegal Mining in Suriname
-
Islamic State and their operations in Turkey throughout 2020
-
Better protect your assets with threat intelligence software
-
The Future of the Energy Industry
-
Nord Stream 2 Pipeline Geopolitics and Russia-Europe Relations
-
Pelosi Taiwan visit: The fourth Taiwan Strait crisis
-
Operation Yellowhammer: Beyond the Mainstream Media
-
Threats to Telecoms Businesses: Mobile Tower Attacks in Pakistan
-
Scotland’s IndyRef2 and the growing independence movement in Wales
-
Security Developments in the Persian Gulf and the Red Sea
-
Republika Srpska: Separatist threats and Balkan instability
-
The future of oil and gas security
-
How and Why Should you be Tracking Geopolitical Risk?
-
Enhance your crisis management capabilities during global incidents with threat intelligence
-
On-demand webinar: What security professionals in the humanitarian aid and development sector should expect
-
Report your own incidents: Create a custom platform for your business
-
We want your feedback
-
Futureproof your intelligence unit with easy-to-use, scalable threat intelligence software
-
The key security threats to gold mining in the Sahel
-
Healthcare risk and health system sustainability in South Asia
-
The Use of Threat Intelligence to Protect University Campuses and Students
-
The only threat intelligence platform designed by intelligence analysts
-
The Tory leadership race and how it reflects the critical issues facing the Western world
-
ChatGPT for OSINT? Integrating AI Chatbots in the Open Source Intelligence Cycle
-
Corporate Security Round-Up 2023
-
Redefining Semiconductor Production and Supply Chains: Taiwan, China, and Southeast Asia
-
Enhance your situational awareness with a simple integration of our threat intelligence feed
-
A guide to using threat intelligence for life sciences
-
Extinction Rebellion in 2021: What is the current state of the group?
-
Tracking illegal mining using threat intelligence
-
Centralise your situational awareness and incident management
-
Ready to learn more about the Draw Area Tool?
-
Save time and resource with intelligence-led risk management
-
Raw information vs actionable intelligence – How intelligence analysts create actionable intelligence
-
Unraveling the Murder Enigma: The alleged spike in US murder rates and the 2024 presidential election
-
Gun violence and gang activity in Gothenburg: Police officer fatally shot in Sweden
-
2024 Predictions: Webinar Follow-up
-
The rise of TikTok as an OSINT tool
-
What are the threats mining companies face while operating in West Africa?
-
How successful is Iran’s foreign policy?
-
Kenya’s Anti-Finance Bill Protests: A Movement Against Economic Inequality and Government Actions
-
Israeli Failures and Hamas Strengths
-
3 Biggest Threats to European Businesses in 2021
-
Could what happened in the Middle East predict Islamic State’s takeover in Africa?
-
How open-source intelligence can shape your physical security
-
Combining threat intelligence and space situational awareness
-
The rising risk of cyber attacks on logistics and transport
-
The effects of protests on businesses in Mexico City
-
Coup d’etat in Guinea: What happened, why did it happen, and what happens next?
-
Explaining the political crisis in Ethiopia
-
How can threat intelligence benefit the banking sector?
-
Escalating anti-lockdown protests and the impact across Europe
-
Pipeline Security in the Nagorno-Karabakh Conflict
-
How does the ongoing unrest across America impact an already damaged economy?
-
Islamic State security concerns at the al-Hol refugee camp
-
How to conduct an effective route threat assessment
-
How to better protect your retail business during unrest
-
The Balochistan Liberation Army and insurgency in Pakistan’s Balochistan Province
-
Under the radar armed conflicts to watch in 2022
-
On-demand webinar: What are corporate security professionals expecting in 2024?
-
Shifting Perceptions on Renewables and Electricity Generation in South Africa
-
How will climate change activism change in a post-pandemic USA?
-
Afghanistan Situation Update: Terrorism, Insurgency and Crime in Afghanistan
-
Mutiny in Mali: What happened in Bamako?
-
What is happening in Belarus?
-
How to develop an effective community engagement strategy
-
The Resonance Chamber: The Mediatic Coverage of Terrorist Attacks
-
Beirut Blast: The Cause, Impact and the Narratives
-
3 things you can do to help mitigate supply chain threats
-
How to develop an effective community engagement strategy in the energy industry
-
What has caused London’s post-lockdown spike in violent crime?
-
What’s happening in Indian politics? Mosque demolitions, communal violence and a precarious religious landscape
-
Threats to the Telecom Sector in South America: From 5G Towers to Cable Laying Ships
-
Illicit Mining Threatening Brazil’s Indigenous People and Ecosystem
-
Post-Incident Report: Karachi Stock Exchange Attack
-
The Danger of Disinformation and the Rise of Ochlocracy
-
What is monkeypox and should businesses be worried?
-
Preparing for Protests and Protecting your Business with Threat Intelligence Software
-
How to develop an effective community engagement strategy in the mining industry
-
The Risk of Renewed Civil Unrest in Hong Kong
-
Afghanistan 2020: Political Instability, Peace Agreements and the Taliban
-
Scepticism surrounding China’s COVID-19 Official Figures and the Impact
-
Threats Impacting the Facilities Management Industry
-
Lessons to be learned from a global pandemic: Planning and exercising
-
COVID-19 and Europe’s Prison System
-
The Correlation between COVID-19 and Crime in Europe
-
The rise of the Albanian Mafia
-
COVID-19 in Rebel-Held Northwest Syria
-
COVID-19 Business Support: Analysis, Forecast and Scenario Planning
-
Navigating the Geopolitics and Risks of Lithium: Essential Insights for a Carbon-Free Future
-
Day of Honour: The far-right kicks off 2020 in Central and Eastern Europe
-
The role of natural resources in conflict
-
Top 10 Podcasts for Intelligence, Security and Geopolitics
-
New York City Crime: 2019 Trends
-
Australia’s Bushfire Crisis: Fuelling Activism and Disruption
-
Get regular intelligence updates on the Russian invasion of Ukraine
-
Iran’s Retaliation for Soleimani’s Assassination: Missile Attacks on US Bases in Iraq
-
The response of the far-right to the Russia-Ukraine war
-
Poland’s Geopolitics: German Rock, Russian Hard Place
-
Kazakhstan’s Geopolitics: Heartland
-
Tanker hijack, drone strike in the Gulf: Iran accused of attacking civilian shipping
-
The social risks driving conflict with the mining industry
-
Mali, Guinea and Senegal – Mining Incidents in 2023
-
Houthi attacks on shipping: How long could the Red Sea crisis last?
-
Deforestation in Colombia: A Multidimensional Threat
-
Taliban Counter Terrorism Operations in Afghanistan
-
Join our free intelligence community
-
Threat Intelligence and Horizon Scanning: How to identify emerging threats
-
Bombings, Bullets and Begging: Organised Crime in Sweden
-
Analysing the Islamic State Attack on Tajikistan
-
A guide to threat intelligence for the mining industry
-
Baghdadi’s Death: In Context
-
Ecuador: Violence, Assassinations Loom Over Elections
-
Will Israel attack Iran?
-
Serbia-Kosovo tensions and NATO’s underbelly
-
The Wagner Group and its imprint in Africa
-
Far-right extremist manifestos: Themes, influences and contradictions
-
Has gun crime increased in the UK?
-
A Guide to using Threat Intelligence in the Built Space
-
How real is Israel’s threat to strike Iran?
-
How to use threat intelligence to minimise supply chain disruption in 2022
-
Can intelligence ever really be predictive?
-
What is the global impact of the Ukraine war?
-
The best way to use a threat intelligence API
-
The AUKUS agreement explained: What impact has it had?
-
ECOWAS response to the Coup in Niger: How likely is conflict in West Africa?
-
Mexican cartels, US guns? Arms trafficking and the Mexican cartel arsenal
-
What’s the economic cost of China’s lockdowns?
-
Using geofencing to enhance your security risk assessment
-
Ukraine counteroffensive: can there be a decisive battle in the modern era?
Book a demo