off

Risk Management: Upgrading the Approach to Access Control

‘If it ain’t broke, don’t fix it’ is a mantra that often describes the best course of action for many situations in life, writes Nick Smith. It’s a phrase that’s probably best suited to something like a bookcase or an oven, but it also often describes the...
Posted On 04 Mar 2019
Stephen Smith
off

The Relentless March of the Cybermen

Cyber security is the protection of Internet-connected systems – including hardware, software and data – from cyber attacks. In a computing context, security comprises cyber security and physical security. Both are used by enterprises to protect against unauthorised...
Posted On 09 Oct 2018
off

Workforce Management Software for Security Operatives: Selecting the Right Solution

Workforce management software comes in different forms, but all of them claim they will help your security services company run more effectively. Which solution are you going to believe in? Mark Folmer outlines seven key questions you should ask to find the right software for...
Posted On 27 Jul 2018
Simon Shawley
off

Unlocking the Full Power of Open Platform VMS

It’s generally understood that Video Management Software (VMS) is able to put operators firmly in control of a video surveillance system by allowing any combination of camera types and images to be displayed on Control Room screens and recorded at the same time. These...
Posted On 06 Jul 2018
off

“Tough new rules” designed to protect UK’s critical infrastructure come into force

New measures put in place by the Government to protect the nation’s critical infrastructure and digital services from cyber attacks and computer network failure have come into force. Bosses of firms in the health, water, energy, transport and digital infrastructure spheres will...
Posted On 11 May 2018
Andrew Shaw
off

Safeguarding Schools: Secure Emergency Lockdown Protocols

The Duty of Care that education officials have in terms of providing a safe environment for everyone on their premises is arguably more challenging in today’s world than at any time in days gone by. One area that should be identified for regular review is emergency lockdown....
Posted On 20 Feb 2018
Duncan Cooke
off

Compliance: It’s About Knowing Your Options

In recent years, one of the reasons why there has been significant growth in the deployment of enterprise level access control systems is that advances in technology have enabled the delivery of significant benefits over and above the basic provision of access control to a...
Posted On 21 Nov 2017
John Davies
off

Predicting The Year Ahead in Security

2016 witnessed some very unexpected and potentially game-changing international political changes, such as the US Presidential Election and Brexit, which have shaken the status quo for many sectors. However, despite some uncertainty, there’s much to be excited about in the...
Posted On 11 Jan 2017
The ICS Security Lab has been launched by Applied Risk
off

Applied Risk launches ICS/SCADA Security Lab to address emerging industrial security threats

Applied Risk, a specialist in the development of industrial control systems security, has announced the launch of its ICS Security Lab to help protect industrial assets and infrastructure from costly cyber attacks. The lab has identified its first vulnerability in Moxa...
Posted On 20 Sep 2015