Posts By: Jacob Charles

Under the influence

Jorge Marinho and Júlio Ventura consider lawfare and foreign influence on politicians as he examines NATO and Portuguese internal intelligence service insights Politicians can be the targets of influence operations directly or indirectly conducted by adversary states, by turning to various instruments such as the media and lobbying firms, for instance. In this case, influence… Read more »

Stay on target

Laura Libeer highlights eight ways to bolster your cyber security resources without blowing your budget IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK organisations shell out an average of £3.4-million for data breach incidents. There isn’t a CISO around that doesn’t wish… Read more »

A false economy

Jamal Elmellas looks at whether the short-term fix of cutting costs could have harmful long-term consequences Over the course of the past year, we’ve seen businesses look to make the security function more efficient and streamlined which has inevitably led to cutbacks. Contraction in spend has also hit vendors, some of which have cut their… Read more »

Canine guardians

James Fee explores the multifaceted ways in which dogs can be harnessed for security Detection dogs possess an uncanny sense of smell, capable of detecting even the faintest of scents. This innate ability has led to their use in detecting contraband substances such as drugs and explosives at airports, border crossings and events. Their accuracy… Read more »

The complete package

Lucy Ketley delves into the fundamentals of physical and cyber security convergence The exploitation of the internet for radicalisation and research means that many abhorrent hostile vehicle terror attacks now originate in the digital realm. This has likely been the case for several years. And although hostile vehicle threat levels are generally low, the digital… Read more »

2023: lessons learned

Eric Boger considers the key trends in critical event management over the last year As we look back on 2023, it’s vital to reflect on what a transformative year it was in the field of critical event management. Throughout the year, we witnessed escalating geopolitical tensions, a huge surge in security threats encompassing both physical… Read more »

Strategy and speed

Crystal Morin reports on the security demands of the cloud Organisations are using more cloud services every year. According to analyst firm IDC, spending on cloud computing will reach $1.37-trillion by 2027. However, while the technology to build and run in the cloud is pushing ahead, security models and processes have to keep up.Cloud computing… Read more »

Taking responsibility

Simon Randall explores the importance of carefully navigating the intersection of biometrics, AI, security, privacy and ethics In the past 18 months, the world has gone through a major technological shift. There have been major advancements in emerging technology, with a surge of generative AI developments that have tipped into the mainstream consciousness. These early… Read more »

Breaking the chain

Phil Robinson investigates why it is that supply chain attacks are still on the rise The MOVEit attack by the Clop ransomware gang proves just how devastating software supply chain attacks can be. The dependency on shared software can see a single attack compromise a multitude of customers, with Emsisoft finding 1,841 organisations have disclosed… Read more »

Come together

Steven Wood reveals why the UK’s defence and security startups are key to meeting global demand for new solutions In light of geopolitical developments and an increasingly insecure international environment, global demand for defence and security solutions has surged in recent years. Fuelled by countries intent on protecting their airspace, surveilling illicit activity, predicting future… Read more »