Posts By: Jacob Charles

MOD Fights Back

Gary Barlet explains why it’s wartime against cyber criminals for the Ministry of Defence As a Western economic, political and military powerhouse, the UK has always been a common target for cyber warfare from nation-state adversaries and cyber criminals. Over the last five years, the Ministry of Defence (MoD) has experienced a 400 percent increase… Read more »

Radicalising And Recruitment

Stuart Macdonald and David Wells reveal how AI is being employed to fuel terrorism The past two years have witnessed growing concerns about the risks of generative artificial intelligence (AI) technologies being exploited by a range of malicious actors, including terrorists, with early attempts by terrorists and violent extremists to experiment with generative AI already… Read more »

Design For Life

Paula Balmori considers how close we are to ‘security by design’ Planning, designing and constructing a building without thought to heating, lighting and other amenities would be seen as madness. No serious building planner would wait until after construction and then say: “now we need to decide where the elevators should go.”And yet, until recently,… Read more »

Joined-up Thinking

Guy Neale navigates the nuances of a secure future – outlining five major paradoxes From international conflicts to borderless crimes, evolving threats paint a challenging picture for national security. Not a day goes by without new headlines on escalating global tensions or discussions around nations’ defence policies. We currently stand at a crossroads of national… Read more »

Held To Ransom

Christian Have examines the correct way to fight back when responding to ransomware Law enforcement efforts against ransomware have seen the takedown of major players such as QakBot and BlackCat/AlphV last year followed by the LockBit group in Operation Cronos and the Volt Typhoon botnet in February. But while this has disrupted operations and seen… Read more »

Rising Confidence

Anthony Young assesses the cyber security risks to the UK’s critical national infrastructure As cyber threats become more frequent and sophisticated, many of the UK’s critical national infrastructure (CNI) organisations are adopting best-practice approaches and growing more confident in their defences. These findings are drawn from recent Bridewell research, which surveyed 521 senior cyber security… Read more »

A New Chapter

Danny Kadyshevitch explains how Generative AI has democratised fraud and cyber crime AI and its transformative potential are on everyone’s mind. The generative AI services that have been released in recent years have sparked a seemingly transformative wave of conversation about what this could mean for the very future of humankind. The release of ChatGPT… Read more »

Close encounters

Al Prescott explores the role of penetration testing in close protection and protective security A penetration test within the close protection environment should seek to challenge the physical and online spaces. It should generate opportunities for an attacker to exploit and seek to expose the principal to physical and reputational harm. Penetration testing can be… Read more »

Safe to learn

Ellie Gibson outlines the steps to creating effective security solutions for campus security University for many students is their first taste of independence and living alone, and as a result they are at their most vulnerable. Students have often never had to think about their own security, instead relying on parents or guardians. Moving to… Read more »

Lessons learned

Jeanne McKinney reveals how battles of the past can help win future wars against terror At the core of every great battle are great lessons. In these days of expanding terror, the world is plagued with over 60 terror groups, designated by the US State Department. A study of the battles during the War on… Read more »