Aaron Rosenmund highlights the six most dangerous new threats security teams need to know about The rise of AI presents both extraordinary opportunities and intimidating challenges in cyber security. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks.As the technology evolves, many organisations prioritise AI innovation at… Read more »
Posts By: Jacob Charles
You’ve been ‘ad
Grant Simmons advises best practices for ad fraud protection Ad fraudsters operate by deceiving digital advertising networks for financial gain. This usually involves manipulating performance metrics through deceptive tactics such as fake impressions, clicks and conversions. Not only does this hamper the effectiveness of campaigns, it also drains ad budgets by diverting money towards fraudulent… Read more »
Insider threats
Miguel Clarke underlines the potential damage that can be caused to your organisation’s cyber security by a ‘wild card’ As cyber attacks escalate globally, organisations face growing challenges not just from external threats, but also from insider risks. With insider threat incidents surging by 44 percent in the past two years and the financial toll… Read more »
Built to last?
Rob Mather outlines how renewed defence demand is stretching manufacturers and offers four key operational trigger points to achieve high-performance manufacturing Defence manufacturers are now facing a rebound in orders, with a reversal in downscaling and defence budgets increasing. But for increased demand to be met, there are four key focus points where digital tools… Read more »
Log file protection
Simon Bain provides an explainer on log files: what are they, why do they matter and how do we protect them? Log files come with many challenges. Firstly, they exist as enormous volumes of data. Almost everything that a user does is recorded, meaning that they quickly pile up, and not all of them are… Read more »
Hamas attacks Israel: One year on
Jeanne McKinney gives the inside story on the terrible 7 October attacks from boots on the ground The following article is largely based on a series of one-on-one interviews with an unnamed member of the IDF community who remains anonymous due to security issues in an active war. A name has been assigned to protect… Read more »
Rough and ready
Fred Kao examines the importance of harnessing technology to transform the military and defence sector Rugged technology is revolutionising the military and defence sector as it continues to play a vital role in improving communication and productivity on the battlefield. This growing trend has led to an increase in demand for more sophisticated devices, but… Read more »
Eyes in the skies
Maël Torca explores pioneering advanced solutions for underwater security challenges The underwater environment, integral to global maritime operations, is increasingly recognised as critical to international security. This domain encompasses not only the vast underwater expanses, but also the vital infrastructure located beneath the ocean’s surface. These include subsea communication cables, pipelines and other critical assets… Read more »
Systems down
Simon Alderson believes vigilance in protection of UK infrastructure has never been more important Criminal activity involving UK infrastructure can have serious national implications, placing a crucial emphasis on rigorous monitoring and security every minute of the year. Facilities categorised as being ‘critical national infrastructure’ (CNI) are those whose loss of function have far-reaching consequences,… Read more »
Pros and cons
Neil Roseman explains how AI innovation can come with great rewards and grave risks It can be difficult to see the risks that come along with the rewards of new technology. Digital innovations often seem to be blind to the potential technology and security risks that invariably come with early-generation technology, no matter how dazzling… Read more »