Posts By: Jacob Charles

Calculated risk?

Barry Scott Zellen examines, following Turkey and Hungary’s consent, the approval by all NATO member states of Finland’s NATO accession On 30 March, the Turkish parliament ratified Finland’s application to join NATO, taking down the final roadblock hindering Finland’s much delayed accession into the expanded Atlantic alliance just two days after the Hungarian parliament did… Read more »

Embracing change

The importance of Access Control for security Through its thirty-plus-year history, the access control industry has quietly plodded along, out of the spotlight of change and transformation, doing what it has always been asked to: keep bad people out and lock and unlock. Overall, it has delivered on that task. To many in the industry,… Read more »

Information warfare

Jorge Marinho addresses various aspects related to influence operations, such as targets, social and individual resilience, ontological security and (counter) intelligence This article addresses various aspects related to influence operations, such as targets, social and individual resilience, ontological security and (counter) intelligence. The internet and Artificial Intelligence, as well as a few aspects with regard to… Read more »

Redressing the balance

intersec invites a selection of women involved in cyber security to explain how the industry is evolving International Women’s Day always prompts introspection about the role of women in society, how things have changed, and what more needs to be done to further equality. This is especially true in cybersecurity, where women are still underrepresented…. Read more »

Cat-and-mouse

Rani Osnat discusses 10 of the cloud security trends that organisations are likely to face in the continually evolving cyber security landscape As anyone involved with cyber security knows, it is a constant game of high stakes cat-and-mouse. Every year new attacks emerge, while new security solutions are created, and old security fixes are upgraded…. Read more »

Protect your weak spots

Paul Baird provides essential advice on the best way to link your operational and IT security together IT security is big business. Gartner predicts that spending on information security products and services will grow by 11.3 percent in 2023, reaching more than $188.3-billion globally. But while the approaches around IT devices, cloud computing services and… Read more »

Eyes in the skies

Matthew Borie explores the significance of the US shooting down a Chinese ‘spy balloon’ High-altitude balloon (HABs) have many civilian uses outside of intelligence, surveillance and reconnaissance (ISR) missions, and are commonly used for scientific research and imagery collection, typically flying at altitudes of FL600-FL999. China has historically utilised HABs in legitimate civilian applications, as well… Read more »

Anyone home?

Julian Free explains why vacant property management calls for a layered approach The Bank of England recently predicted that the UK’s current economic downturn will be the longest on record, resulting in a slowdown of UK construction and commercial activities. This news is expected to further drive up the number of vacant commercial properties in… Read more »

Pilot Mass-Murder Suicides

Brian Michael Jenkins and Bruce Butterworth report on airliner sabotage by pilot murder-suicide and explain why, though rare, they are events not without precedent Just over one year on from the tragedy that saw China Eastern Flight 5735 inexplicably crash, there is still no formal report from the investigating authorities as to the cause of… Read more »

A missed opportunity

Eddie Bejarano explains why in Peru, old wounds are likely to remain open Images of civil unrest have emanated from Peru since the arrest of then-President Pedro Castillo on 7 December in Lima. These have ranged from peaceful protests to violent demonstrations that have caused civilian deaths. For many onlookers, it would appear that Peru… Read more »