Posts By: Jacob Charles

Collaborating to succeed

Victor Acin reveals why it’s time to socialise cyber security It’s no secret that IT security leaders are under tremendous pressure today. A barrage of commodity threats and increasingly sophisticated targeted attacks imperil the bottom line, corporate reputation and ambitious digital transformation projects. Things have got to the point that, rather than ask what keeps… Read more »

Better together

John Matthews on why converging security IT ops and cloud expertise holds the answer for better business outcomes Once, the job of Network Operations (NetOps) was to make sure the network was operating at its fastest and best. Security Operations (SecOps) made sure it was protected from all manner of hackers, vulnerabilities and cyber threats…. Read more »

Internet extremism

Paolo Zucconi examines the world of E-Jihad and reveals how cyberspace assists extremist strategy and tactics The nefarious use of the cyber domain helps accomplish Islamic terrorist organisations strategic and tactical aims worldwide. Since 1996, it has been used for jihadi activities. Azzam.com is a perfect example. It is a jihadist website to honor Abdallah… Read more »

Taking control

Mike O’Malley looks at the issues as Japan reveals a radical approach to securing IoT at a national level before the 2020 Olympics This time next year, all eyes will be turned towards Japan as we watch on in excited expectation as hundreds of sportsmen and women aim to achieve extraordinary things as they gather… Read more »

Driving ambition

Graeme Simpson reports on the challenge of building cyber-secure cars for the unknown future For many of the UK’s car owners, airbags are an assumed feature in any car. In fact, it’s safe to say that any modern car found on our roads in the past decade had airbags. Yet, car manufacturers aren’t obliged, legally… Read more »

First response

Tremaine Kent considers what can be done to help deal with battlefield injuries on our streets in the event of a terror attack It is human nature to want to help other people in trouble in emergency situations, but as testimonies in the recent inquest into the London Bridge attacks of 2017 in the UK… Read more »

University security

Darren Chalmers-Stevens examines global universities and the safety and security dividend With the contribution of international students to the UK economy estimated to be worth £20bn – and with safety a priority for both parents and students – it’s little wonder that attitudes towards security departments are changing. Universities are under growing pressure – from… Read more »

CCTV’s GDPR minefield

Andrew Crowne-Spencer examines how – a year down the line – general data protection regulations are standing up and discovers where CCTV is concerned, there is still work to be done CCTV has been with us for over 75 years, since as far back as 1942 during World War II, when the Germans set up… Read more »

Seal of approval

Kai Schnapauff reports on how solutions for protection against tampering of official documents is adding value to government products Protection against tampering and counterfeiting of official documents or seals has traditionally been an important concern. Equally important in government applications are seamless process integration capabilities and additional functional features. This means that customised solutions must… Read more »

Return of The Troubles?

Timothy Compston considers the threat posed by dissident republican terrorism after the murder of a journalist. The tragic shooting of 29-year-old journalist Lyra McKee by a masked New IRA gunman while she was covering rioting in the Creggan area of Derry/Londonderry back in April from behind police lines – an action that has been roundly… Read more »