Posts By: Jacob Charles

Safe to study

Robert Platt explores what can be done to lock violence out of educational institutes When it comes to student safety, walking the tightrope between creating a welcoming environment on the one hand and visible surveillance that may be unsettling or restricts personal privacy is a delicate balance. With budgets ever more constrained by economic considerations… Read more »

Cyber security goldrush

Ilan Barda reveals what’s behind the huge growth in cybersecurity and why people remain the most vital tool in the fight back against attacks The global pandemic has hit IT spending with analyst firm Gartner forecasting a 7.3 percent drop this year. However, cyber security spending is still on the rise – and one of… Read more »

Mastering data

Alain Vernadat examines the need to put data at the heart of the investigation Data explosion is a reality, and it has become the golden nugget of the 21st century. As the volume of digital data generated per year is growing exponentially, this new dimension is shaking up the way in which law enforcement agencies… Read more »

Identifying vulnerabilites

Adam Palmer explains why it is time to take control of your cyber risk The last 12 months have been a challenge for organisations for a variety of reasons. However, front and centre in the response has been technology. With governments globally imposing work-from-home mandates, a rapid move to remote work caused many businesses to… Read more »

Evolving threat

Jules Werner considers the importance of security and defence in the complex threat landscape It would be a mistake to assume today that multi-domain threats are limited purely to an all-out, conventional ‘shooting war’. There are now numerous examples of conventional and asymmetric adversaries; these are characterised by an ability to blend new technology and… Read more »

Power line analytics

Paul D Turner explores deployment strategies for PLC and BPL baseline monitoring and use of near real-time captured spectrum data as a powerful reference tool for comparative analysis Powerful defensive counter-espionage Software Defined Radio (SDR) technology has paved the way for a new analytical power line methodology.The analytical process has decidedly shifted from the uncertainty… Read more »

Access denied

Catherine Laug examines the options when it comes to security and access control for public underground trains The transport sector is vulnerable to safety and security risks, particularly railways and underground train lines. When it comes to public transport, the high number of passengers generates major risks and gives access control a mission-critical role to… Read more »

Eyes in the skies

Nicolas Billecocq reveals new roles for drones and explains how they can solve potential socially distanced security issues When it comes to physical security measures, there is no one-size-fits-all solution. There are always different ways to address different threats, and the physical protection of any property, room or area needs to be designed in accordance… Read more »

Shine a light

Ziv Mador delves into the depths of the Dark Web and explains why it’s important to understand its workings to stay one step ahead of its threat The Dark Web has long served as an invaluable tool for facilitating international crime. From firearms and narcotics to violent services for hire, any illegal item or criminal… Read more »

Prime targets

Christoph Hebeisen reveals how as the world continues to go mobile, cyber threats are following suit Traditionally, cyberattacks have targeted desktop computers and servers in corporate networks. But with the evolution of technology moving our online life into the cloud – both personal and work – attackers are shifting their focus towards smartphones, tablets and… Read more »