Anthony Young outlines why 2025 will be a challenging year for cyber security Few industries evolve as fast – or as unpredictably – as cyber security and 2025 will be no exception. The year ahead promises advances in AI-driven attack strategies, heightened regulatory demands, and escalating threats targeting critical infrastructure. To stay ahead, organisations must… Read more »
Posts By: Jacob Charles
Border control
Karen Kingham reveals the latest innovations in port security systems If money is what makes the world go round, it’s the goods on ships sailing round the world that makes the money! And a staggering 80 percent of all global trade travels the world on the planet’s oceans and seas.Many of the cars we drive… Read more »
Forest fire!
Dan Lattimer explores the challenges and misconceptions of AD forest structures Microsoft Active Directory (AD) is fundamental to the operational success of most enterprises today. Understanding why involves looking at its origins. Before AD, Microsoft’s IT directory servers couldn’t scale for medium and large enterprises, requiring multiple servers. For example, a tech company with 1,000… Read more »
War on Israel
Jeanne McKinney examines Hamas and Israel’s race to secure the grail of power in the Middle East The following article is largely based on a series of one-on-one interviews with an unnamed member of the IDF community who remains anonymous due to security issues in an active war. A name has been assigned to protect… Read more »
Breaking the cycle
Sid Madge outlines the future of prison rehabilitation programmes and asks if it can be compatible with security One of the most contentious issues in the discussion about rehabilitation is the early release of prisoners, a measure often used to ease overcrowding in prisons. Early release programmes, such as parole or home detention curfews, are… Read more »
Aerial automatic
Tristan Wood explains why ‘heterogeneous’ connectivity is the only way ahead Some forecasts predict the drone economy exceeding $90-billion globally by the end of the decade as numerous industries realise the potential to transform their operations, from enterprise and logistics to first responders and defence.The market materialised in the late noughties, originally out of a… Read more »
Facial recognition mythbuster
Tamara Morozova examines some of the leading misconceptions about facial recognition Facial biometrics is not a novel technology, it is being used to elevate security and operational efficiency for more than a decade. Although the applications of facial recognition technology (FRT) still requires vast exploration, its footprint is constantly deepening. As its adoption expands over… Read more »
Look to the future
David Tuddenham reveal how AI is being used for security tracking, resulting in a step change in capability We are moving ever closer to an era where all our movements are tracked by cameras that can analyse behaviours and predict potential threats. This isn’t a dystopian plot, but a reality shaped by the advancements in… Read more »
Knowledge is power
Aaron Rosenmund highlights the six most dangerous new threats security teams need to know about The rise of AI presents both extraordinary opportunities and intimidating challenges in cyber security. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks.As the technology evolves, many organisations prioritise AI innovation at… Read more »
You’ve been ‘ad
Grant Simmons advises best practices for ad fraud protection Ad fraudsters operate by deceiving digital advertising networks for financial gain. This usually involves manipulating performance metrics through deceptive tactics such as fake impressions, clicks and conversions. Not only does this hamper the effectiveness of campaigns, it also drains ad budgets by diverting money towards fraudulent… Read more »