Posts By: Jacob Charles

Pragmatism payoff

Raghu Nandakumara explains the essential role that Zero Trust plays when it comes to transforming cyber concerns from mountains into mole hills Digital transformation has been the watchword of the last decade, and in the past two years, the concept has become even more synonymous with hyperconnectivity. The Covid-19 pandemic accelerated the move to the… Read more »

Cyber world war

Alon Schwartz reveals how the Russian invasion of Ukraine is fuelling a cyber war Russia’s invasion of Ukraine has placed Europe in a precarious position. From a security standpoint, perhaps one of the most concerning implications of the invasion has been the aggravation of cybercriminal activity – a consequence that policymakers are already flagging with… Read more »

Meeting the challenge

Martin Riley puts the NIS2 Directive under the microscope to reveal what it means for Managed Service Providers The EU’s Networks & Information Systems Directive and Regulations (NIS) aims to improve the cyber security and resilience of critical systems across Europe with the Directive enacted in UK law as the NIS Regulations. First introduced in… Read more »

Time for change

Marc Lee explains why the war in Ukraine should serve as an early warning for the West to reconsider the threat from China and Russia Brexit, the pandemic and the war in Ukraine have fundamentally changed the world and how purchasing decisions will be made. What are the issues and why is the private sector… Read more »

Red alert

Jamie Fretwell, explains why alarm receiving centres play a vital role in protecting against intruders by providing a rapid signal identification and actioning service Since the advent of electronic CCTV and access control technology, alarm receiving centres ( ARCs) have been mainstays of the security industry. Commonly defined as remote monitoring facilities where security operators… Read more »

Path to peace

Barry Scott Zellen explains why as the Arctic thaw continues, lifting the Arctic Council pause presents Russia a viable route to resolution While it took the collapse of the Soviet Union to make possible the unique multi-level, multilateral collaboration that the Arctic Council (AC) has nurtured for a quarter century since its 1996 formation, with… Read more »

Watching brief

Steven Jussaume explains how body-worn cameras are being employed to efficiently address the challenges of correctional facilities Since the mid-2010s, there have been numerous studies, pilots and deployments of body-worn cameras (BWCs) in various industry segments. Law enforcement has been at the forefront of these. In being one of the primary users of such cameras,… Read more »

Balancing act

Paul Thompson discusses the issue of security versus aesthetics and explains how BIM software can aid collaborative working and create the essential ‘golden thread’ of information Maintaining a strong design identity without compromising on product performance is crucial during the specifying process of any office. When it comes to doors and ironmongery, there are several… Read more »

Held to ransom

Fighting the ransomware pandemic: what to do if you suffer a ransomware attack and how to prevent it Ransomware remains one of the top cyber risks for businesses across a range of sectors. With several high-profile companies, such as the UK arm of Salvation Army and Ireland’s Health Service Executive, falling victim to ransomware attacks… Read more »

Knowledge is power

Elad Shamir reports on the importance of understanding and protecting against Kerberos  Log4Shell, ProxyLogon, and ProxyShell vulnerabilities have dominated cybersecurity news over the past few weeks. A recent joint Cybersecurity Advisory from the CISA, NSA, FBI, ASCS, CCS and NZ NCSC, and NCSC-UK notes ‘Kerberoasting’ as a potential method for malicious escalation of privilege. The infamous… Read more »