Heligan Group examines how China’s tech ambitions and intelligence efforts are placing UK national security at risk At its core, the central goal of the People’s Republic of China (PRC) is simple: to maintain the dominance of the Chinese Communist Party (CCP). Every aspect of Chinese policy, whether that be economic, technological or geopolitical, serves… Read more »
Posts By: Jacob Charles
Designing out risk
Richard Ellis examines how early integration of physical security into urban design can create safer, more welcoming public spaces without compromising aesthetics. Philip Zimbardo’s now-famous ‘Broken Windows Theory’ continues to shape the way we understand crime, space, and human behaviour. Though formulated nearly five decades ago, its implications are still felt in modern urban security… Read more »
Time for a reset?
Barry Scott Zellen, PhD, examines what impact the Alaska Peace Summit will have on US-Russia relations and restores Arctic exceptionalism It’s no coincidence that August’s peace summit took place in America’s 49th state. Alaska has a long and proud heritage as part of the Russian Empire via the Russian-American Company, providing a historical bridge between… Read more »
Safety first
Frank Mueller explores how LiDAR protects railways from new and existing dangers In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame… Read more »
Rapid response
Richard Ford examines the first 24 hours after a ransomware attack and asks: “What should you do?” A ransomware attack is a nightmare scenario for any organisation. It’s disruptive costly, and often deeply damaging to your reputation. How you respond in the first 24 hours can make all the difference between containment and catastrophe. In… Read more »
Hacker’s eye view
Neil Roseman outlines the difference checkbox vulnerability management and real AppSec risk mitigation can make In enterprise applications, systems, and infrastructure, vulnerabilities are an unavoidable reality. The problem is not that they exist, but whether organisations have the right tools and strategies to identify, prioritise and remediate the vulnerabilities that truly matter.Too often, vulnerability management… Read more »
Risky business
James Griffin reveals why the UK’s new cyber law makes relying only on Microsoft 365 security a risky move for MSPs The UK’s Cyber Security and Resilience Bill will demand a rethink among Managed Service Providers (MSPs). With the UK Parliament set to grant regulators more teeth, MSPs will face tougher expectations not just around… Read more »
AI-Spy
Mats Thulin discusses the delicate position of artificial intelligence within security and surveillance – and the importance of getting it right Artificial Intelligence is no longer the next big thing. It has, as all new technologies do, made its way through the hype cycle, from initially inflated expectations to inevitable disillusionment – but it has… Read more »
Sustainable identity
Grégory Magnasco explores the environmental challenge of polycarbonate and recycled plastics in identity documents As the ecological transition becomes a global priority, the identity document industry is also called upon to rethink its practices. Long focused on security, physical durability and technological innovation, the industry is now evaluating a new performance pillar: its environmental footprint.Traditionally,… Read more »
Maximising potential
Matt Philip evaluates Wi-Fi mounting solutions for secure networks in industrial environments A research collaboration between Gardner Engineering Ltd (GE) and the University of Sheffield’s Advanced Manufacturing Research Centre (AMRC) has revealed a critical but often under appreciated factor in secure network design: the physical mounting of wireless access points.This joint study explores how mounting… Read more »