Google+

Security News, Publishing, Products and more...

Counter Terror

Human Trafficking – It Is Your Business

September 7, 2014

human trafficking

Business, regardless of its size, can support human trafficking either directly or indirectly. Human trafficking is not a straightforward challenge.

Nice Systems: Debunking Voice Recognition Myths

August 26, 2014

Voice Recognition SND

The recent tragic news regarding James Foley has brought voice recognition into the media spotlight. So it’s time to set the record straight.

British forensic solution could provide answers on Flight MH17

July 22, 2014

MH17, Malaysian Airlines Flight MH17, Flight MH17

Flight MH17 is calling for answers on who is truly responsible. A British company has developed a solution that would be invaluable at such disasters.

British explosives detector ideal for counter terrorism

July 4, 2014

selective antibodies dipstick test for explosives

British invention that detects minute traces of explosives could provide significant help in securing our transport networks from terrorist attacks.

Terrorism Studies at University of St. Andrews

June 30, 2014

terrorism studies

Online short course from the Handa Centre for the Study of Terrorism and Political Violence at the University of St Andrews.

The Need for Citadels Escalates as Armed Guard Controversy Continues

June 29, 2014

Marine Armor System

With the latest security alert from BIMCO effectively rendering the use of armed guards commercially placed on merchant vessels illegal in Nigeria, the need for citadels onboard vessels has never been greater.

Securing Asia and Africa 2014 is almost here

June 27, 2014

securing asia feature

Security Asia and Africa is gearing up for the 2014 event. Set to take place from 14 – 15 July at the Queen Elizabeth Conference Centre, in London.

Security integral to the British army’s military vehicle showcase

June 26, 2014

IMG_1968

The UK’s biggest military vehicle demonstration, Defence Vehicle Dynamics (DVD) has provided a unique insight into the equipment used by the British Army.

HeartBleed Shows How to Quickly Assess Vulnerabilities

June 5, 2014

heartbleed

Ahead of Pen Test Berlin 2014 course author, Mark Baggett, suggests system admins and defenders can also benefit from coding knowledge.

How to Protect Against Gameover ZeuS, from AccessData

June 5, 2014

gameover zeus

AccessData comments on international police collaboration that has disrupted the botnet command and control servers used by cyber criminals to distribute Gameover ZeuS.