Posts By: Jacob Charles

Insider threats

Miguel Clarke underlines the potential damage that can be caused to your organisation’s cyber security by a ‘wild card’ As cyber attacks escalate globally, organisations face growing challenges not just from external threats, but also from insider risks. With insider threat incidents surging by 44 percent in the past two years and the financial toll… Read more »

Built to last?

Rob Mather outlines how renewed defence demand is stretching manufacturers and offers four key operational trigger points to achieve high-performance manufacturing Defence manufacturers are now facing a rebound in orders, with a reversal in downscaling and defence budgets increasing. But for increased demand to be met, there are four key focus points where digital tools… Read more »

Log file protection

Simon Bain provides an explainer on log files: what are they, why do they matter and how do we protect them? Log files come with many challenges. Firstly, they exist as enormous volumes of data. Almost everything that a user does is recorded, meaning that they quickly pile up, and not all of them are… Read more »

Hamas attacks Israel: One year on

Jeanne McKinney gives the inside story on the terrible 7 October attacks from boots on the ground The following article is largely based on a series of one-on-one interviews with an unnamed member of the IDF community who remains anonymous due to security issues in an active war. A name has been assigned to protect… Read more »

Rough and ready

Fred Kao examines the importance of harnessing technology to transform the military and defence sector Rugged technology is revolutionising the military and defence sector as it continues to play a vital role in improving communication and productivity on the battlefield. This growing trend has led to an increase in demand for more sophisticated devices, but… Read more »

Eyes in the skies

Maël Torca explores pioneering advanced solutions for underwater security challenges The underwater environment, integral to global maritime operations, is increasingly recognised as critical to international security. This domain encompasses not only the vast underwater expanses, but also the vital infrastructure located beneath the ocean’s surface. These include subsea communication cables, pipelines and other critical assets… Read more »

Systems down

Simon Alderson believes vigilance in protection of UK infrastructure has never been more important Criminal activity involving UK infrastructure can have serious national implications, placing a crucial emphasis on rigorous monitoring and security every minute of the year. Facilities categorised as being ‘critical national infrastructure’ (CNI) are those whose loss of function have far-reaching consequences,… Read more »

Pros and cons

Neil Roseman explains how AI innovation can come with great rewards and grave risks It can be difficult to see the risks that come along with the rewards of new technology. Digital innovations often seem to be blind to the potential technology and security risks that invariably come with early-generation technology, no matter how dazzling… Read more »

The weakest link

Sam Peters shows how businesses can fortify defences amid spiralling supply chain attacks The commercial world as we know it revolves around supply chains. In today’s interconnected and highly digitised trading environment, supply chains represent a complex web of interlinked relationships which enable the movement of goods and services between providers and their customers. These… Read more »

Fighting back

Phil Robinson provides some top tips to beat hackers The attacker is winning in the perpetual battle over assets. There’s been a 30 percent year-on-year increase in cyber attacks as of Q2 2024, according to Check Point Research, which suggests that technological advancements are not seeing defenders gain the upper hand. So, what should organisations… Read more »