In the film Skyfall, a large audience has been exposed to a James Bond plot that initially seems more plausible than the stereotypes. Certainly a stolen MI6 hard drive being used to identify and expose undercover agents is more grounded than stealing nuclear submarines. But just how plausible is it exactly? Would any megalomaniac supervillain be able to access the data? And would it present a serious threat to the nation?

The BSIA’s Amanda Beesley reports on the growing export trend for UK private security.

The BSIA’s James Kelly discusses how a layered approach to security can help keep threats at bay

How can a seemingly ordinary person turn into a terrorist? Author and professor Roger Griffin 
argues that studying the motivations behind a terrorist could be what’s needed to stop an attack

Most businesses consider doing due diligence on their supply chain, but does that include suppliers of Data Warehousing? asks Chris Phillips, of the International Protect and Prepare Security Office

Following the annoucement from the TSA in America to remove backscatter x-ray scanners from airports, Chris Yates asks if there is a better way for passengers to get through security check points

The Perimeter Security Suppliers Association (PSSA) has introduced a verification scheme providing confidence to perimeter systems buyers and users that products meet internationally recognised standards.

In the economic downturn, Cyber conflict is flourishing, which puts us all in a position of logical, and at times, physical exposure to cyber criminals and hackers, writes Professor John Walker

The Global Terrorism Index, is the first index to systematically rank and compare 158 countries worldwide over a ten-year period to shed light on the impact of terrorism

Ross Parsell, director of cyber security at Thales UK, talks about The Research Institute in the Science of CyberSecurity

Pages