Posts By: Jacob Charles

Remote control

Paul D Turner reveals the significance of Remote Spectrum Surveillance and Monitoring in part two of his TSCM series There is a relatively simple answer to dramatically improving both the Probability of Detection (POD) and the Probability of Intercept (POI) from a TSCM perspective. What you don’t know; you don’t know and therefore, you cannot… Read more »

Watch the skies

Paul Hicks explains what can be done to protect authorities – and the public – from the risk of drone attacks on the UK’s critical national infrastructure Imagine a Britain with no gas, electricity, water or other vital services – where modern life as we know it grinds to a halt. Sounds like an apocalyptic… Read more »

Limiting risk

Phil Beecher explains what can be done to mitigate the security risks as smart cities grow As the development of smart cities continues to accelerate, security has become an important part of the discussion, especially as more and more Internet of Things devices connect to the network. The Mirai botnet showed us just how exposed… Read more »

Cut through the noise

John Gilbert reports on the importance of reducing the vulnerability of organisations to cyber crime and fraud Cyber crime and fraud are a growing threat to UK organisations. According to figures published by the Department for Digital, Culture, Media and Sport (DCMS), 32 percent of businesses have suffered at least one cyber attack or breach… Read more »

Big data protection

Fouad Khalil reports of the varied difficulties of keeping up with changing data regulations around the world For decades the personal information of individuals has largely been treated as a commodity to be harvested, bought and sold like any other resource. The trend accelerated as we entered the digital era, with the vogue for big… Read more »

Technical security reality

Paul D Turner explains why technical surveillance counter measures (TSCM) remain as vital as ever in the current climate I t is a well-established fact that cyber security generally sees the lion’s share of the available budget and support resources often at the expense of a formal technical security programme. Confused? There is a difference… Read more »

Student security

Dan Meyrick reports on the challenge of keeping students safe from enrolment to graduation From kindergarten to high school and all the way through university, we spend a considerable amount of our lives attending educational institutions. Apart from enabling learning, these vital places have a responsibility to keep their students safe. Unauthorised visitors, theft and… Read more »

Disaster recovery

Peter Groucutt explains why it’s so important and why organisations need to keep it font of mind As a society we are increasingly dependent on technology to keep businesses running smoothly. While tech has brought many benefits, our reliance on it can mean that any type of incident – whether a premeditated criminal cyber attack,… Read more »

Artificial intelligence

Martin Cronin examines the growing importance of the role of technology in security, potentially detecting threats before they occur Today’s threat landscape is unpredictable and volatile, made even more so when set against the challenging backdrop of increased pressure on police forces, budget constraints, political instability and rising international threat levels. It cannot be denied… Read more »

Mobile police technology

Simon Hall investigates how the police use technology to bridge the generational divide on the frontline After nearly a decade of austerity, UK police forces will soon be enjoying an influx of 20,000 new officers over the next three years. But how will they cope with so many new recruits in such a short time?… Read more »