off

BSIA issues guidelines on minimising connected security systems’ exposure to digital sabotage

The British Security Industry Association (BSIA) has published a summary of current guidelines to minimise the exposure to digital sabotage of network-connected equipment, software and systems used in electronic security. ‘Cyber Secure It’ – Best Practice Guidelines...
Posted On 14 Jan 2019
David Ferbrache
off

KPMG CTO David Ferbrache highlights Top Ten cyber security trends for 2019

David Ferbrache, chief technology officer in KPMG’s cyber security practice, has highlighted the Top Ten cyber security trends we can expect to see in 2019. Those trends include a lack of consensus when it comes to cyber law, the proliferation of fake news (and the implications...
Posted On 09 Jan 2019
off

Data Centre Security: Constructing Facilities That Can Handle Seismic Activity

Data Centre construction is a complex business and, as Ian Dixon asserts, presents a unique collection of challenges compared to other buildings of a comparable size. A Data Centre provider’s reputation depends entirely on its ability to keep information safe and secure for as...
Posted On 08 Jan 2019
off

Access Control: GARDiS in the Cloud

Using the Cloud for physical security began with Video-as-a-Service solutions. That showed the benefits of transmitting and storing secure feeds which can only be viewed and saved on an authorised device. For some years, this was hampered by the amount of data to be transmitted....
Posted On 14 Dec 2018
off

Major criminal threats to retailers at Christmas identified by LodgIC Intelligence Centre

This Christmas, the risk posed to retailers’ margins from theft is greater than ever before. According to the LodgIC Intelligence Centre, the escalated threat results from three factors: increased activity by organised criminal gangs, reduced security staffing resulting from the...
Posted On 11 Dec 2018
Jon Roadnight
off

Drones: Why Is The Security Threat Posed Not Being Taken Seriously?

The threat horizon within the context of security risk management continually evolves, writes Jon Roadnight. Threats emerge largely in response to the identification of vulnerabilities. Those vulnerabilities are either perceived or real, but without a vulnerability or weakness,...
Posted On 26 Nov 2018
off

3XLOGIC’s award-winning security solutions available in Europe through PAC

3XLOGIC, the provider of integrated, intelligent security solutions and a three-time Deloitte Technology Fast 500 winner, has announced the availability of its portfolio of solutions including infinias access control, the VIGIL video management system (VMS) and TRENDS business...
Posted On 08 Nov 2018
Stephen Smith
off

The Relentless March of the Cybermen

Cyber security is the protection of Internet-connected systems – including hardware, software and data – from cyber attacks. In a computing context, security comprises cyber security and physical security. Both are used by enterprises to protect against unauthorised...
Posted On 09 Oct 2018
off

Heathrow Airport Limited fined £120,000 by ICO for “serious failings” in data protection

Heathrow Airport Limited (HAL) has been fined £120,000 by the Information Commissioner’s Office (ICO) for failing to ensure that the personal data held on its network was properly secured. On 16 October 2017, a member of the public found a USB memory stick which had been...
Posted On 08 Oct 2018
off

Institute of Risk Management launches all-new Digital Risk Management Certificate

A new specialist Certificate awarded by the Institute of Risk Management (IRM) – and developed with support from the WMG Cyber Security Centre at the University of Warwick as well as input from the University’s Department of Politics and International Studies – has...
Posted On 24 Sep 2018