Jeanne McKinney examines Hamas and Israel’s race to secure the grail of power in the Middle East The following article is largely based on a series of one-on-one interviews with an unnamed member of the IDF community who remains anonymous due to security issues in an active war. A name has been assigned to protect… Read more »
Monthly Archives: November 2024
Breaking the cycle
Sid Madge outlines the future of prison rehabilitation programmes and asks if it can be compatible with security One of the most contentious issues in the discussion about rehabilitation is the early release of prisoners, a measure often used to ease overcrowding in prisons. Early release programmes, such as parole or home detention curfews, are… Read more »
Aerial automatic
Tristan Wood explains why ‘heterogeneous’ connectivity is the only way ahead Some forecasts predict the drone economy exceeding $90-billion globally by the end of the decade as numerous industries realise the potential to transform their operations, from enterprise and logistics to first responders and defence.The market materialised in the late noughties, originally out of a… Read more »
Facial recognition mythbuster
Tamara Morozova examines some of the leading misconceptions about facial recognition Facial biometrics is not a novel technology, it is being used to elevate security and operational efficiency for more than a decade. Although the applications of facial recognition technology (FRT) still requires vast exploration, its footprint is constantly deepening. As its adoption expands over… Read more »
Look to the future
David Tuddenham reveal how AI is being used for security tracking, resulting in a step change in capability We are moving ever closer to an era where all our movements are tracked by cameras that can analyse behaviours and predict potential threats. This isn’t a dystopian plot, but a reality shaped by the advancements in… Read more »
Knowledge is power
Aaron Rosenmund highlights the six most dangerous new threats security teams need to know about The rise of AI presents both extraordinary opportunities and intimidating challenges in cyber security. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks.As the technology evolves, many organisations prioritise AI innovation at… Read more »
You’ve been ‘ad
Grant Simmons advises best practices for ad fraud protection Ad fraudsters operate by deceiving digital advertising networks for financial gain. This usually involves manipulating performance metrics through deceptive tactics such as fake impressions, clicks and conversions. Not only does this hamper the effectiveness of campaigns, it also drains ad budgets by diverting money towards fraudulent… Read more »
Insider threats
Miguel Clarke underlines the potential damage that can be caused to your organisation’s cyber security by a ‘wild card’ As cyber attacks escalate globally, organisations face growing challenges not just from external threats, but also from insider risks. With insider threat incidents surging by 44 percent in the past two years and the financial toll… Read more »
Built to last?
Rob Mather outlines how renewed defence demand is stretching manufacturers and offers four key operational trigger points to achieve high-performance manufacturing Defence manufacturers are now facing a rebound in orders, with a reversal in downscaling and defence budgets increasing. But for increased demand to be met, there are four key focus points where digital tools… Read more »
Log file protection
Simon Bain provides an explainer on log files: what are they, why do they matter and how do we protect them? Log files come with many challenges. Firstly, they exist as enormous volumes of data. Almost everything that a user does is recorded, meaning that they quickly pile up, and not all of them are… Read more »