5 Benefits of a Corporate Travel Risk Program

corporate travel risk map

Authored by: Nikki Desai (Associate Director, Security Consulting) An effective travel risk program is a key tool in any company’s risk management effort. Travel risk programs provide end-to-end service for traveling employees, starting from when the employee’s trip is planned up until the employee’s safe return home. The process typically begins with a risk assessment […]

What Are Data Aggregators and How Do They Pose a Risk to Your Privacy and Security?

srub pii from the web

Authored by: Aaniyah Hicks, Red Five Investigative Intern What are Data Aggregators? Data aggregators, also known as people-finder sites, scour the internet looking for people’s personally identifiable information (PII) in order to compile easily accessible online profiles of the individual. Data aggregators pull your information from a variety of public sources, including public records such as […]

What’s The Big Deal About TikTok and What Can You Do to Protect Your Data

tiktok privacy

  TikTok is an extremely popular short-form video social media platform that has attracted more than 150 million active users in the US. It has garnered so much attention—and  ire—from  the federal government, state governments, international bodies, and private institutions due to its popularity, the dangers associated with the platform’s data collection, and the potential […]

Spotlight on Pegasus Spyware

iphone spyware

  Authored by: Kathryn McConaughy, Red Five Open Source Analyst   In late 2021 and early 2022, Pegasus spyware garnered a flurry of media attention, and it’s easy to see why. Developed by an Israeli security company, Pegasus is purported to be the most advanced commercial spyware to date and it has huge implications for […]

Evolution of Crypto & Geopolitical Risk

blockchain technologies have global implications

Authored by: Linda Gomez   Cryptocurrencies and Web3 technologies have been on a crusade to disrupt legacy institutions like central banking since Bitcoin’s launch in 2009–but it seems they can disrupt more than just banking.   In just over a decade, decentralized ledger technologies (DLTs), like virtual currencies (VCs) and the blockchain networks enabling transactions, […]

Artificial Intelligence Apps: Associated Privacy Risks and How to Address Them

Authored by: Jefferson Antwi-Agyei A few years ago, many people were quick to take part in the viral social media trend of uploading photos of themselves into FaceApp, an Artificial Intelligence (AI) app that applied a filter to age the photos of users’ faces. However, what appeared to be a harmless social media trend posed […]

Rising Physical Security Threats to Cryptocurrency Leaders

Authored By: Garrett Bell When we think of crime involving cryptocurrency, we tend to think of scams and high-profile hacks in which bad actors steal large amounts of cryptocurrency from their victims. However, in addition to cyber threats related to cryptocurrency, there are also various physical security threats that may target those involved with cryptocurrency. […]

Five Common Cryptocurrency Scams and How to Avoid Them

Blockchain security

  Cryptocurrencies have seen an explosion of popularity in recent years and with good reason.  “These assets aren’t going anywhere,” said Nick Gicinto, who joined the Red Five Security team in September 2022 and brings with him a wealth of experience in blockchain and cryptocurrency. “There were a lot of skeptics who said it was […]

Child Safety Online – Important Things to Know

A child logs onto the internet for the first time every half-second, according to a UNICEF study. The internet has become increasingly more important in our lives for a variety of purposes from education to entertainment to staying connected with each other, but as the benefits of the internet have increased, so have the risks […]