Articles & Research

Industry Articles for Informational Purposes

At North Star Group, we aim to provide you with valuable resources to stay informed about industry trends and insights. Below, you'll find a curated list of external industry articles that we believe to be relevant and insightful. Please note that these articles are produced by either third-party sources and / or represent the views of their respective authors. They do not reflect the opinions or positions of North Star Group, and we are not liable for their content. These resources are shared strictly for informational purposes, helping you stay informed and make educated decisions.

 

 

DOJ Begins Enforcement of New Data Security Program | Proskauer - Minding Your Business - JDSupra

Data Protection, Privacy and Security

 

Should I travel with a burner phone? What legal experts say.

Travel Security-Risk Management

 

The Need for Security Risk Management at Live Events

Hospitality, Tourism and Entertainment Security

 

Senate Hearing on Organized Retail Theft | Video | C-SPAN.org

Organized Retail Crime

 

US farm agency fires 70 foreign researchers following national security review | Reuters

Threat Management and Intelligence

 

'Active clubs' are all over Canada. What are they? | CBC News

Extremism and Political Instability 

 

Check Your Privacy Settings: Bodyguards’ Fitness Apps Used to Track Swedish Leaders’ Travel, Private Residences

Security-Risk Management and Executive Protection

 

OSINT Breadcrumbs: How Small Clues Lead to Big Breakthroughs

Open-Sourced Intelligence

 

The Other AI: ‘Active Involvement’ by Humans Is Critical in School Security - Campus Safety Magazine

School Safety and Security

 

Fire truck found when FBI raids Brentwood home - ABC7 Los Angeles

Operational Intelligence

 

DuckDuckGo now lets you hide AI-generated images in search results | TechCrunch

Data Protection, Privacy and Security

 

Bipartisan legislation aimed at strengthening seaport security introduced - Homeland Preparedness News

Critical Infrastructure Security