off

Securing Critical Assets

Access control systems have come a long way since the invention of the lock and key. Advancements in technology have realised solutions to be integrated with web-based systems, allowing for traceability and time management within mechanical keys. Here, Pip Courcoux discusses...
Posted On 15 Apr 2018
off

In the Spotlight: ASIS International UK Chapter

Accusations and recriminations between Britain and Russia are set to escalate with the recent news that scientists at the Porton Down military research facility have been unable to establish exactly where the nerve agent used to carry out the attack on former MI6 agent Sergei...
Posted On 15 Apr 2018
off

FIA Technical Briefing

At the end of this month, the Fire Industry Manufacturers Expo is coming to Ashton Gate Stadium in Bristol. The event is organised by the Fire Industry Association (FIA) and helps to build the bridge between manufacturers of fire detection and alarm products and those in the...
Posted On 15 Apr 2018
off

The Risk Management Journey

There’s no crystal ball that will magically outline opportunities, map risks and provide a distinct and unobstructed path to success. Nonetheless, as Steve Schlarman observes, there are specific stages that organisations can expect to move through when building an integrated risk...
Posted On 15 Apr 2018
off

The Security Institute’s View

Prevent is one of the four Ps that make up the pillars of the UK’s counter-terrorism strategy developed by the Home Office in early 2003, although it remained secret until 2006. Its remit was widened in 2011 and it was placed on a statutory footing in 2015, but how effectively is...
Posted On 15 Apr 2018
off

BSIA Briefing

In mid-October, the Office for National Statistics (ONS) issued the findings of its Crime Survey for England and Wales for the year ending June 2017. While crime estimated by the study has fallen considerably from the peak levels recorded back in 1995, the volume of violence...
Posted On 15 Apr 2018
off

Successful Cloud and Mobile Technology Strategies: Security of Data

Companies have faced unprecedented security challenges and risks to the integrity of their networks since cloud computing, the Bring Your Own Device (BYOD) concept and mobile technology forged a permanent place in business IT strategies. How, then, might those risks and...
Posted On 15 Apr 2018
off

Time for Transformation

Looking towards the future roadmap for private sector security provision in the UK, Danny Williams tracks the move from traditional security guarding to the delivery of a new style of service that affords value-driven, predictive and intelligent solutions making use of client and...
Posted On 15 Apr 2018
off

Evolving Backwards: Strategies for Adapting to Devolving Threats

With relatively efficient and professional policing and a robust private security sector, terrorism and organised crime have historically been kept to manageable levels. Across the past few years, though, there have been upticks in terrorism and violent crime trends as...
Posted On 15 Apr 2018
off

Nortech’s parking system enhances risk management efficiencies at Tewkesbury Community Hospital

Gloucestershire Care Services NHS Trust has recently updated and improved Tewkesbury Community Hospital’s car park by using Nortech’s FeeMaster system. The Feemaster range was installed by entry control system specialist ASGuk, who had been appointed to the project by the NHS...
Posted On 15 Apr 2018
12