Posts By: Jacob Charles

Finding a balance

Keiron Dalton discusses the existing vulnerabilities in 4G mobile infrastructure and the way forward for customer authentication Many of us have become highly reliant on mobile banking by now as a means of managing our finances both quickly and efficiently, which is why we feel so anxious when a story about a security vulnerability hits… Read more »

Dealing with the malware threat

Daniel Driver explores the growing threat of malware and what can be done to fight back In reality, the biggest security threat that most organisations are exposed to exists within their own network. Social Engineering is a growing method for hackers who want to break into networks, and endpoint security cannot identify if an authorised… Read more »

Securing your place in the industry

Sarah Hayward reports on the increased recruitment opportunities for the right applicants We have reached an interesting juncture in the world of security. No longer is the industry purely seen as the preserve of former police and military professionals, it is now firmly (and rightly) recognised as a career in its own right. This is… Read more »

Time to get smart

Paul Dodds explains how collaboration can give cities of the future the advantage when it comes to security Cities everywhere are growing at an exponential rate. More than half of the world’s population lives in cities. By 2030, it is predicted two out of three people will be living in an urban area. To manage… Read more »

Threatwatch Europe

GROUPS Jane’s Terrorism and Insurgency Centre (JTIC), IHS Markit report on the main groups posing a threat across the continent Groups Jane’s Terrorism and Insurgency Centre (JTIC), IHS Markit report on the main groups posing a threat across the continent PKK The PKK is a Kurdish militant organisation operating primarily in South-East Turkey. Initially espousing… Read more »

Casting a wider net

Jim Viscardi explains how ferromagnetic detection provides more effective and efficient ways for mass screening Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favourite soccer team annihilating the… Read more »

Tactical communications

Rob Hall explains why good communication is vital for the emergency services in the event of a terrorist attack When faced with an emergency, there’s limited time to assess the situation, determine the response and coordinate/deliver it. The scenario can change rapidly, requiring the response to be scaled up/down accordingly. With multiple emergency services, victims,… Read more »

Mining for gold

Ben Williams explains how to protect yourself from the spiralling threat of malicious cryptojacking adverts. Most of you have probably heard about the soaring value of cryptocurrencies. The price of one Bitcoin, the most popular digital currency, has rocketed from just $0.003 seven years ago to $7,604 today. It was inevitable that the surging demand,… Read more »

NIS directive explained

Alan Levine reveals how all the attention on the GDPR deadline means that the implications of the Networks and Information Systems Directive may have fallen by the wayside The much-anticipated wait for the General Data Protection Regulation (GDPR) finally came to an end on the 25 May of this year. Over the last 18 months,… Read more »

Digital marketing security

Roy Dovaston explains the importance of maintaining a secure digital campaign Recently, digital marketing has become an invaluable platform for businesses to cost effectively reach an extended audience base; particularly as social media has become an integral part of public life. However, a sufficient digital marketing campaign requires considerable investment in both time and effort…. Read more »