Jeanne McKinney considers how realistic a terrorist nuclear attack really is Terrorists operate to kill as many people as possible with one strike. Whether it be a suicide vest, vehicular-borne bombs, using commercial jets as missiles, exploding a bomb from a small boat alongside a ship, or synchronised ground massacres, none are as powerful as… Read more »
Posts By: Jacob Charles
Greenland’s Geopolitical ascendance
Barry Scott Zellen on Trump’s continued interest in the vast island Across Arctic North America, from Alaska to Greenland, there has been an ongoing dialogue between the resource development and environmental factions of each community. The resulting dialectic oscillates like a pendulum across the generations – sometimes stopping big projects (such as Alaska’s Project Chariot,… Read more »
Critical communication
Dietmar Gollnick on the importance of staying in touch when it really matters Do you remember how it used to be? Very early, around 1850, the railway was invented. A new means of travel enabling ‘word of mouth’ communication between people in extended areas. A means of communication that requires extensive infrastructure. In the late… Read more »
Understaffed and unprepared
Dan Lattimer reveals how ransomware gangs are exploiting downtime and material corporate events Cyber criminals don’t observe business hours – they create the perfect moment to strike when they know the Security Operations Centre (SOC) will be least prepared. While 96 percent of organisations run a SOC 24/7 for 365 days a year, 85 percent… Read more »
The intruder within
Richard Hilson explains why humans are the weakest link in your CNI security chain Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even ‘mac addresses’ or a person of interest’s gait now all make up the technology toolbox of forward-thinking… Read more »
Disaster in the making?
David Carvallho examines whether the UK government’s Apple backdoor demand is such a wise move The UK government’s latest demand for Apple to create a backdoor for encrypted iCloud data has ignited a global debate on privacy, security and the dangers of centralised control. While policymakers claim such measures are necessary for national security, history… Read more »
Back up!
Iwona Zalewska explains how adopting the 3-2-1 back-up rule can safeguard personal and corporate data People are on the move – to and from the office, working from home or logging on at remote sites – and this means their data, and that of their company, is at risk. Data loss or data inaccessibility comes… Read more »
Chaos unleashed
Jeanne McKinney reports on building a culture of resistance History shows that when a government’s foreign policy includes helping Islamic rebels and resistance fighters overthrow a government – they do not factor in short or long-term scenarios. Jihad has become more than regime change in the wake of the Arab Spring that began in Tunisia… Read more »
Protecting reputation
Dean Enon examines the dilemma of managing corporate reputation and argues that the private security sector is winning the corporate battle There can’t be many professions that have been around for longer than security. Well before commercialisation and capitalism ruled nations, keeping people and places secure has been a territorial priority for centuries. So why… Read more »
Ready for anything?
Sverre Puustusmaa considers whether or not we’re best prepared for the next crisis We seem to be frequently stepping from one crisis to another. From raging wildfires in California and waves of refugees reshaping borders, to global wars and political brinkmanship with President Trump’s rhetoric about ‘buying’ Greenland and the Panama Canal. Natural disasters, wars,… Read more »