Paolo Zucconi examines the world of E-Jihad and reveals how cyberspace assists extremist strategy and tactics The nefarious use of the cyber domain helps accomplish Islamic terrorist organisations strategic and tactical aims worldwide. Since 1996, it has been used for jihadi activities. Azzam.com is a perfect example. It is a jihadist website to honor Abdallah… Read more »
Posts Categorized: July/August 2019
Taking control
Mike O’Malley looks at the issues as Japan reveals a radical approach to securing IoT at a national level before the 2020 Olympics This time next year, all eyes will be turned towards Japan as we watch on in excited expectation as hundreds of sportsmen and women aim to achieve extraordinary things as they gather… Read more »
Driving ambition
Graeme Simpson reports on the challenge of building cyber-secure cars for the unknown future For many of the UK’s car owners, airbags are an assumed feature in any car. In fact, it’s safe to say that any modern car found on our roads in the past decade had airbags. Yet, car manufacturers aren’t obliged, legally… Read more »
First response
Tremaine Kent considers what can be done to help deal with battlefield injuries on our streets in the event of a terror attack It is human nature to want to help other people in trouble in emergency situations, but as testimonies in the recent inquest into the London Bridge attacks of 2017 in the UK… Read more »
University security
Darren Chalmers-Stevens examines global universities and the safety and security dividend With the contribution of international students to the UK economy estimated to be worth £20bn – and with safety a priority for both parents and students – it’s little wonder that attitudes towards security departments are changing. Universities are under growing pressure – from… Read more »
CCTV’s GDPR minefield
Andrew Crowne-Spencer examines how – a year down the line – general data protection regulations are standing up and discovers where CCTV is concerned, there is still work to be done CCTV has been with us for over 75 years, since as far back as 1942 during World War II, when the Germans set up… Read more »
Seal of approval
Kai Schnapauff reports on how solutions for protection against tampering of official documents is adding value to government products Protection against tampering and counterfeiting of official documents or seals has traditionally been an important concern. Equally important in government applications are seamless process integration capabilities and additional functional features. This means that customised solutions must… Read more »