Monthly Archives: April 2025

The new intelligence cycle

Ed Currie reports on the importance of accelerating the path from detection to action The speed of the electronic warfare (EW) intelligence cycle has never been more important. With modern conflicts demonstrating how quickly the EW environment and technology can evolve, EW operators must be equipped to make fast, informed decisions based on clear, reliable… Read more »

Walking a nuclear tightrope

Gary Abbott examines where the next crisis for the Middle East lies As the dust appears to settle in the Middle East after over a year of conflict, another conflict looms on the horizon. US intelligence suggests Iran is drawing up plans for the faster development of nuclear weapons, prompting Israel to reportedly consider striking… Read more »

A nuclear Trojan horse?

Jeanne McKinney considers how realistic a terrorist nuclear attack really is Terrorists operate to kill as many people as possible with one strike. Whether it be a suicide vest, vehicular-borne bombs, using commercial jets as missiles, exploding a bomb from a small boat alongside a ship, or synchronised ground massacres, none are as powerful as… Read more »

Greenland’s Geopolitical ascendance

Barry Scott Zellen on Trump’s continued interest in the vast island Across Arctic North America, from Alaska to Greenland, there has been an ongoing dialogue between the resource development and environmental factions of each community. The resulting dialectic oscillates like a pendulum across the generations – sometimes stopping big projects (such as Alaska’s Project Chariot,… Read more »

Critical communication

Dietmar Gollnick on the importance of staying in touch when it really matters Do you remember how it used to be? Very early, around 1850, the railway was invented. A new means of travel enabling ‘word of mouth’ communication between people in extended areas. A means of communication that requires extensive infrastructure. In the late… Read more »

Understaffed and unprepared

Dan Lattimer reveals how ransomware gangs are exploiting downtime and material corporate events Cyber criminals don’t observe business hours – they create the perfect moment to strike when they know the Security Operations Centre (SOC) will be least prepared. While 96 percent of organisations run a SOC 24/7 for 365 days a year, 85 percent… Read more »

The intruder within

Richard Hilson explains why humans are the weakest link in your CNI security chain Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even ‘mac addresses’ or a person of interest’s gait now all make up the technology toolbox of forward-thinking… Read more »

Disaster in the making?

David Carvallho examines whether the UK government’s Apple backdoor demand is such a wise move The UK government’s latest demand for Apple to create a backdoor for encrypted iCloud data has ignited a global debate on privacy, security and the dangers of centralised control. While policymakers claim such measures are necessary for national security, history… Read more »

Back up!

Iwona Zalewska explains how adopting the 3-2-1 back-up rule can safeguard personal and corporate data People are on the move – to and from the office, working from home or logging on at remote sites – and this means their data, and that of their company, is at risk. Data loss or data inaccessibility comes… Read more »