In the film Skyfall, a large audience has been exposed to a James Bond plot that initially seems more plausible than the stereotypes. Certainly a stolen MI6 hard drive being used to identify and expose undercover agents is more grounded than stealing nuclear submarines. But just how plausible is it exactly? Would any megalomaniac supervillain be able to access the data? And would it present a serious threat to the nation?
How can a seemingly ordinary person turn into a terrorist? Author and professor Roger Griffin argues that studying the motivations behind a terrorist could be what’s needed to stop an attack
Most businesses consider doing due diligence on their supply chain, but does that include suppliers of Data Warehousing? asks Chris Phillips, of the International Protect and Prepare Security Office
Following the annoucement from the TSA in America to remove backscatter x-ray scanners from airports, Chris Yates asks if there is a better way for passengers to get through security check points
The Perimeter Security Suppliers Association (PSSA) has introduced a verification scheme providing confidence to perimeter systems buyers and users that products meet internationally recognised standards.
In the economic downturn, Cyber conflict is flourishing, which puts us all in a position of logical, and at times, physical exposure to cyber criminals and hackers, writes Professor John Walker
The Global Terrorism Index, is the first index to systematically rank and compare 158 countries worldwide over a ten-year period to shed light on the impact of terrorism