John Frost (left) M&S with Scott Wilson (right) CT Policing

Counter Terrorism Police have joined forces with M&S to train over a million crowded places workers. Here, the organisation explains why

Hacking cyber security for GDPR in three steps

ISSA-UK members have collaborated and got straight to the heart of GDPR to identify the five hidden articles relating to technology. Andy Burston explains

Defending against the detonation of a ‘dirty bomb’

Dr Rico Chandra looks at the requirement for a network of radiation detection systems to counter the growing fear that terrorists could develop a ‘dirty bomb’

CTB Panel of Experts: critical communications

CTB takes a looks at the stability and flexibility of mission critical communications and how organisations can ensure that mission critical communications remain secure and ‘hack proof’

Identifying hostile and criminal intent

Behavioural Analysis 2018 is a two-day security conference exploring non-racial profiling, stress responses, behavioural indicators and tactical risk analysis techniques

Operating in a secure online environment

With technology now prevalent in all areas of life, security of devices should be encouraged in the same way as physical security, writes Hannah Khoo

Remote Radicalisation: Mitigating the risks

James Kelly discusses the importance of ensuring that there is a basic level of physical defence at all times

Have I got a problem at my location?

Simon Towers examines the threat of vehicles as a weapon for terrorism, and how perimeter security products can aid against the threat

Improving public safety through technology partnerships

One of the most important tools against the terrorist threat is our technology, says Ian Thompson, chief executive of British APCO

Stepping up security for Chinese New Year

Gavin Hepburn, director at ATG Access, describes the importance of ensuring the public is kept safe during the UK’s Chinese New Year celebrations

Pages