Posts By: Jacob Charles

Hacker’s eye view

Neil Roseman outlines the difference checkbox vulnerability management and real AppSec risk mitigation can make In enterprise applications, systems, and infrastructure, vulnerabilities are an unavoidable reality. The problem is not that they exist, but whether organisations have the right tools and strategies to identify, prioritise and remediate the vulnerabilities that truly matter.Too often, vulnerability management… Read more »

Risky business

James Griffin reveals why the UK’s new cyber law makes relying only on Microsoft 365 security a risky move for MSPs The UK’s Cyber Security and Resilience Bill will demand a rethink among Managed Service Providers (MSPs). With the UK Parliament set to grant regulators more teeth, MSPs will face tougher expectations not just around… Read more »

AI-Spy

Mats Thulin discusses the delicate position of artificial intelligence within security and surveillance – and the importance of getting it right Artificial Intelligence is no longer the next big thing. It has, as all new technologies do, made its way through the hype cycle, from initially inflated expectations to inevitable disillusionment – but it has… Read more »

Sustainable identity

Grégory Magnasco explores the environmental challenge of polycarbonate and recycled plastics in identity documents As the ecological transition becomes a global priority, the identity document industry is also called upon to rethink its practices. Long focused on security, physical durability and technological innovation, the industry is now evaluating a new performance pillar: its environmental footprint.Traditionally,… Read more »

Maximising potential

Matt Philip evaluates Wi-Fi mounting solutions for secure networks in industrial environments A research collaboration between Gardner Engineering Ltd (GE) and the University of Sheffield’s Advanced Manufacturing Research Centre (AMRC) has revealed a critical but often under appreciated factor in secure network design: the physical mounting of wireless access points.This joint study explores how mounting… Read more »

Eye spy

Alan Ring outlines how festival security can be improved with body-worn cameras As summer approaches, the UK festival scene is preparing for another busy season. With the industry growing at a compound annual rate (CAGR) of 5.7 percent over the past five years, more festivals are popping up across the country and more attendees are… Read more »

To catch a thief

Titan Security reports on why retail security in the West has become less effective and what can be done to solve it. Over the last few years, retail security in the West has become less effective at combatting crime. In 2024 especially, sharp increases were seen in both retail thefts and violence against staff across… Read more »

Playing with fire

Jeanne McKinney examines the risks of legitimising terror We see shifting alliances, violent clashes and quests for power between terrorists, militants and rebels all over the Middle East and Africa. In an interview last Autumn, an IDF soldier explained to me this “fighting” Middle East culture that rules the day for those in the region…. Read more »

Taking the initiative

Rajat Bhargava explores ways to step out from Shadow AI and turn risk to strategic advantage For years, shadow IT has been seen as a threat, an unmonitored and uncontrolled force undermining corporate policies, creating security gaps and circumventing procurement channels. If you’re an IT professional working at a mid-sized organisation, there’s a 90 percent… Read more »

Nato in the Arctic

Barry Scott Zellen, PhD, reports on the tectonic shift from euphoric expansion to intra-alliance crisis Since Russia’s 2022 invasion of Ukraine, there’s been a tectonic shift in Arctic diplomacy and security, resulting in the March 2022 diplomatic boycott of the Arctic Council under Russia’s term as rotating chair (2021-23), followed by the rapid pivot by… Read more »