Monthly Archives: October 2025

Ring the alarm!

Paul Fitzgerald explores evolving approaches to school security for creating safer learning environments In today’s climate, ensuring the safety of pupils and staff is a growing priority for education providers. While school leaders focus on nurturing environments for learning and development, they must also navigate an increasingly complex security landscape. From petty vandalism to high-risk… Read more »

Lock down!

Jon Hill unlocks the key to safer prison security Modern prisons are among the most challenging of facilities to manage and secure. They are dynamic, high-risk settings where tensions can escalate quickly and where the consequences of even a minor lapse in security can be serious. The pressures facing these institutions are increasing. They’re compounded… Read more »

Just what the doctor ordered

Simon Wilson considers the digital evolution of access control in healthcare Security is paramount in the healthcare sector, and the safety and wellbeing of patients, staff and visitors is critical. However, the complex nature of these environments can present unique challenges, with disparate areas such as emergency wards, operating theatres, utility areas and IT hubs… Read more »

Identity confirmed

Jérôme Frou explores the role of identity documents and finda out what can be done to protect them Every year, millions of people are denied basic rights simply because their identity is not recognised. An identity document is far more than just an administrative formality. It is the key that allows an individual to exist… Read more »

Faking it

Richard Ford investigates the rise of deepfakes and how best to defend against them Deepfake technology represents one of the most unnerving developments in the cyber threat landscape over the past decade. What began as a curious and humorous novelty involving videos of celebrities saying unlikely things they never actually said has swiftly evolved into… Read more »

Play it safe

Jim Lippie reveals the hidden dangers of SaaS applications SaaS adoption is skyrocketing. The average company now uses 112 SaaS applications, but with half of all SaaS accounts being largely unmanaged guest users this trend is leaving organisations vulnerable to cyber threats they may not even see coming. To uncover the hidden security risks in… Read more »

To swerve and protect

Rory McGoldrick outlines what can be done to minimise the effects of HVM T raffic management (TM) and hostile vehicle mitigation (HVM) are inextricably linked, but it’s vital to remember that the two disciplines are complementary, not the same. While traffic management often involves road closures, it’s HVM that protects the road closure from hostile… Read more »

False alarm

Barry Scott Zellen, PhD, reveals why Beijing’s Arctic presence is being exaggerated by the West Anew report by Harvard University’s Belfer Centre for Science and International Affairs, Cutting Through Narratives on Chinese Arctic Investments published on 23 June, 2025, confirmed what I have long argued that China’s historic presence and contemporary influence in the Arctic… Read more »

Policing the skies

Tal Cohen considers the rise of Cyber Over RF in counter-drone defence In the ever-shifting landscape of global security, the growing prevalence of drones has introduced a new category of threat that transcends borders, conflicts and even conventional definitions of warfare. Drones are no longer exclusive to military forces; they are now widely accessible, affordable… Read more »