Paul D Turner reveals the significance of Remote Spectrum Surveillance and Monitoring in part two of his TSCM series There is a relatively simple answer to dramatically improving both the Probability of Detection (POD) and the Probability of Intercept (POI) from a TSCM perspective. What you don’t know; you don’t know and therefore, you cannot… Read more »
Posts By: Jacob Charles
Watch the skies
Paul Hicks explains what can be done to protect authorities – and the public – from the risk of drone attacks on the UK’s critical national infrastructure Imagine a Britain with no gas, electricity, water or other vital services – where modern life as we know it grinds to a halt. Sounds like an apocalyptic… Read more »
Limiting risk
Phil Beecher explains what can be done to mitigate the security risks as smart cities grow As the development of smart cities continues to accelerate, security has become an important part of the discussion, especially as more and more Internet of Things devices connect to the network. The Mirai botnet showed us just how exposed… Read more »
Cut through the noise
John Gilbert reports on the importance of reducing the vulnerability of organisations to cyber crime and fraud Cyber crime and fraud are a growing threat to UK organisations. According to figures published by the Department for Digital, Culture, Media and Sport (DCMS), 32 percent of businesses have suffered at least one cyber attack or breach… Read more »
Big data protection
Fouad Khalil reports of the varied difficulties of keeping up with changing data regulations around the world For decades the personal information of individuals has largely been treated as a commodity to be harvested, bought and sold like any other resource. The trend accelerated as we entered the digital era, with the vogue for big… Read more »
Technical security reality
Paul D Turner explains why technical surveillance counter measures (TSCM) remain as vital as ever in the current climate I t is a well-established fact that cyber security generally sees the lion’s share of the available budget and support resources often at the expense of a formal technical security programme. Confused? There is a difference… Read more »
Student security
Dan Meyrick reports on the challenge of keeping students safe from enrolment to graduation From kindergarten to high school and all the way through university, we spend a considerable amount of our lives attending educational institutions. Apart from enabling learning, these vital places have a responsibility to keep their students safe. Unauthorised visitors, theft and… Read more »
Disaster recovery
Peter Groucutt explains why it’s so important and why organisations need to keep it font of mind As a society we are increasingly dependent on technology to keep businesses running smoothly. While tech has brought many benefits, our reliance on it can mean that any type of incident – whether a premeditated criminal cyber attack,… Read more »
Artificial intelligence
Martin Cronin examines the growing importance of the role of technology in security, potentially detecting threats before they occur Today’s threat landscape is unpredictable and volatile, made even more so when set against the challenging backdrop of increased pressure on police forces, budget constraints, political instability and rising international threat levels. It cannot be denied… Read more »
Mobile police technology
Simon Hall investigates how the police use technology to bridge the generational divide on the frontline After nearly a decade of austerity, UK police forces will soon be enjoying an influx of 20,000 new officers over the next three years. But how will they cope with so many new recruits in such a short time?… Read more »