jump to navigation

Part 2: Vetting Security Companies & Their Principals February 15, 2012

Posted by Chris Mark in Risk & Risk Management.
Tags: , , , , , , ,
2 comments

As I read Kevin Doherty’s questions for vetting security companies, I felt compelled to add some additional commentary.  It is important to really do your due diligence on the principals of security companies.  It is the leadership that will define the ethics, and attitude of the organization.  If the owner is prone to dishonesty or misrepresentations then the staff is likely to follow their lead.  Unfortunately, in the high risk world of maritime security (and other security) the fallout can cost more than money. In a very real sense, lives can be lost.

(more…)

“Pick your poison” – Security or Convenience February 15, 2012

Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.
Tags: , , , , , , ,
3 comments

I have discussed the challenges of security & convenience for some time.  The latest news regarding the 10 year breach of Nortel gave me new fodder for the discussion.

Whether we are discussing information security, physical security, operational security (to name a few) the concepts of security & convenience are diametrically opposed. When we talk of convenience we can include operational efficiency in the discussion.  Consider a companies like Nortel with a large IT infrastructure.  One one side of the discussion is the IT department.  They are constantly hearing about how they need 99.999 uptime and faster systems.  In the payment card industry where transaction times are critical additional latency can be problematic.  They also hear over and over about how someone needs more access to more data.   (more…)

Nortel Network Compromised for a Decade; Chinese Suspected February 14, 2012

Posted by Chris Mark in Industry News, InfoSec & Privacy, Risk & Risk Management.
Tags: , , , , , , , ,
1 comment so far

According to MSNBC, Nortel’s network was open to hackers since at least 2000.  It is suspected that the hackers are Chinese.  The data thieves appear to have had nearly “unfettered access” to the network and were able to download: ” “technical papers, research-and-development reports, business plans, employee emails and other documents.”  How did they access the network?  Simple. (more…)

Vetting Armed Security Providers February 13, 2012

Posted by Chris Mark in Risk & Risk Management.
Tags: , , , , , , ,
1 comment so far

Nexus Consulting’s CEO, Kevin Doherty was kind enough to let me post a questionnaire his company developed specifically for companies considering the use of armed security on ships.  Nexus has conducted hundreds of transits through the Gulf of Aden and is one of the original maritime security companies and currently one of only 3 companies in the US that work with US Flagged vessels.  Please download the document here.

Nigerian Pirates Kill 2 in Attack on Cargo Ship February 13, 2012

Posted by Chris Mark in Industry News, Piracy & Maritime Security, Risk & Risk Management.
Tags: , , , , , , , ,
add a comment

In the increasingly dangerous waters off of West Africa and in the Gulf of Guinea, Nigerian pirates attacked a cargo ship and killed the captain and chief engineer.  This attacks comes on the heels of another attack off the coast of Benin last Thursday.  The attack took place about 110 nautical miles off the coast of Lagos.  Read the story here.