Skip to content
Grab The Axe LogoGrab The Axe Logo
  • Home
  • ABOUT
  • SERVICES
  • INSIGHTS
  • NEWS
  • MEDIA
  • WE SUPPORT
  • CONTACT
  • Toggle website search
  • Home
  • ABOUT
  • SERVICES
  • INSIGHTS
  • NEWS
  • MEDIA
  • WE SUPPORT
  • CONTACT
  • Toggle website search
Read more about the article Layered Critical Infrastructure Defense: A Practical Strategy for Protecting Geographically Dispersed Assets
Drone Security / Physical Security

Layered Critical Infrastructure Defense: A Practical Strategy for Protecting Geographically Dispersed Assets

Did you know that physical attacks on the U.S. power grid hit an all-time high in 2023? That isn't a headline to scare you. It's a field report on the…

0 Comments
September 27, 2025
Read more about the article Physical Security Since 9/11: A 24-Year Retrospective on Protecting Public Spaces
Security Insights / Physical Security

Physical Security Since 9/11: A 24-Year Retrospective on Protecting Public Spaces

Twenty-four years ago, the world learned a brutal lesson about the failure of imagination. The 9/11 Commission Report didn't just document a tragedy. It gave us a blueprint for security…

0 Comments
September 11, 2025
Read more about the article Counter-Drone Technology for Critical Infrastructure: A Practical Guide to Detection and Mitigation
Drone Security / Physical Security / Tech Innovations in Security

Counter-Drone Technology for Critical Infrastructure: A Practical Guide to Detection and Mitigation

The FAA reports over 100 sightings of unauthorized drones near airports each month. That isn't a future problem. It's a clear and present operational threat. For those of us responsible…

0 Comments
August 23, 2025
Read more about the article Beyond the Firewall: A 2025 Guide to OT Security for Critical Infrastructure Protection
Cyber Security / Security Insights / Tech Innovations in Security

Beyond the Firewall: A 2025 Guide to OT Security for Critical Infrastructure Protection

By 2025, it's projected that over 75% of Operational Technology (OT) organizations will have experienced an intrusion that spills over into operational disruption. That's a staggering figure, up from just…

0 Comments
August 4, 2025

About The Author

Picture of Chris Armour

Chris Armour

Director of Software Engineering at Grab The Axe, leads the development of secure, scalable software solutions that drive growth and innovation. With expertise in network security, coding, and AI, he aligns technology strategies with business goals while mentoring high-performing teams. He holds a Bachelor of Science degree in Network Security from the University of Advancing Technology and is dedicated to advancing digital security and software innovation.

Categories

  • Tech Innovations in Security
  • Security News
  • Security Insights
  • Psychology
  • Privacy News
  • Physical Security
  • Drone Security
  • Cyber Security
  • Compliance News
  • Artificial Intelligence

Subscribe Now
For Further News and Updates
Email is required Email is not valid
Thanks for your subscription.
Failed to subscribe, please contact admin.
Grab The Axe Logo
Grab The Axe Logo
Subscribe Now
For Further News and Updates
Email is required Email is not valid
Thanks for your subscription.
Failed to subscribe, please contact admin.

SECURITY IN HAND

Contact Info

(602) 828-0532

info@grabtheaxe.com

18250 N. 32nd St.

Phoenix, Arizona 85032

Hours of Operation

24/7, Year Round

Service Area

Located in Phoenix, Arizona

National and Global Assessments Available

Privacy Policy | Terms of Service | Opt-out preferences

© 2025 Grab The Axe, LLC
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}