Posts By: Jacob Charles

Play it safe

Jim Lippie reveals the hidden dangers of SaaS applications SaaS adoption is skyrocketing. The average company now uses 112 SaaS applications, but with half of all SaaS accounts being largely unmanaged guest users this trend is leaving organisations vulnerable to cyber threats they may not even see coming. To uncover the hidden security risks in… Read more »

To swerve and protect

Rory McGoldrick outlines what can be done to minimise the effects of HVM T raffic management (TM) and hostile vehicle mitigation (HVM) are inextricably linked, but it’s vital to remember that the two disciplines are complementary, not the same. While traffic management often involves road closures, it’s HVM that protects the road closure from hostile… Read more »

False alarm

Barry Scott Zellen, PhD, reveals why Beijing’s Arctic presence is being exaggerated by the West Anew report by Harvard University’s Belfer Centre for Science and International Affairs, Cutting Through Narratives on Chinese Arctic Investments published on 23 June, 2025, confirmed what I have long argued that China’s historic presence and contemporary influence in the Arctic… Read more »

Policing the skies

Tal Cohen considers the rise of Cyber Over RF in counter-drone defence In the ever-shifting landscape of global security, the growing prevalence of drones has introduced a new category of threat that transcends borders, conflicts and even conventional definitions of warfare. Drones are no longer exclusive to military forces; they are now widely accessible, affordable… Read more »

Military readiness

Chris Morton and Bianca Nobilo offer a new perspective on strategy, logistics and digital defences in light of lessons learnt from the Russia-Ukraine conflict It is only when conflict breaks out that military readiness and its potential vulnerabilities can be tested and exposed. The Russia-Ukraine war is moving to its third year, and has highlighted… Read more »

Taking control

Heligan Group examines how China’s tech ambitions and intelligence efforts are placing UK national security at risk At its core, the central goal of the People’s Republic of China (PRC) is simple: to maintain the dominance of the Chinese Communist Party (CCP). Every aspect of Chinese policy, whether that be economic, technological or geopolitical, serves… Read more »

Designing out risk

Richard Ellis examines how early integration of physical security into urban design can create safer, more welcoming public spaces without compromising aesthetics. Philip Zimbardo’s now-famous ‘Broken Windows Theory’ continues to shape the way we understand crime, space, and human behaviour. Though formulated nearly five decades ago, its implications are still felt in modern urban security… Read more »

Time for a reset?

Barry Scott Zellen, PhD, examines what impact the Alaska Peace Summit will have on US-Russia relations and restores Arctic exceptionalism It’s no coincidence that August’s peace summit took place in America’s 49th state. Alaska has a long and proud heritage as part of the Russian Empire via the Russian-American Company, providing a historical bridge between… Read more »

Safety first

Frank Mueller explores how LiDAR protects railways from new and existing dangers In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame… Read more »

Rapid response

Richard Ford examines the first 24 hours after a ransomware attack and asks: “What should you do?” A ransomware attack is a nightmare scenario for any organisation. It’s disruptive costly, and often deeply damaging to your reputation. How you respond in the first 24 hours can make all the difference between containment and catastrophe. In… Read more »