Duty of Care in Dynamic Security Environments

Duty of care is a legal concept that refers to the responsibility individuals or organizations have to act in a reasonable manner to prevent harm to others. It is a fundamental principle in various aspects of commerce and industry, emphasizing the need to exercise caution and take appropriate measures to protect the well-being of others who may be affected by their actions or decisions. In the Security and Risk Management Read more…

Key Components of Advanced Off-Road Driver Training

Advanced off-road training is a specialized form of training designed to enhance the skills and knowledge of experienced off-road enthusiasts or professionals. This type of training goes beyond the basics of off-road driving and focuses on honing specific techniques and strategies to navigate challenging terrains safely and effectively. It can be useful for individuals involved in off-road racing, adventure tourism, off-road rescue operations, and anyone seeking to push their off-road Read more…

How can the Corporate Security Industry Innovate?

The corporate security industry can innovate in several ways to adapt to emerging threats and enhance its effectiveness. Like any sector, the core areas for innovative thinking may include personnel, equipment, facilities and training, to consultancy, intelligence, technology and software. Here are some potential areas for innovation: Advanced Technologies: Embrace and leverage advanced technologies to improve security measures. This includes adopting artificial intelligence (AI) and machine learning (ML) algorithms to Read more…

How could and should AI enhance collaboration and coordination with C-UAS systems and operations?

AI can play a significant role in enhancing collaboration and coordination with Counter-Unmanned Aircraft Systems (C-UAS) systems and operations. Here are some ways AI can contribute to this area: Threat detection and classification: AI can analyze sensor data from various sources, such as radar, cameras, and acoustic sensors, to detect and classify potential threats posed by unmanned aircraft systems (UAS). By leveraging machine learning algorithms, AI can continuously learn and Read more…

How Cyber Secure in Generative AI?

Generative AI refers to the subset of artificial intelligence that involves creating or generating content, such as text, images, or videos. While generative AI has many exciting applications, it also introduces potential security concerns. Here are some aspects to consider regarding the cybersecurity of generative AI: Data privacy: Generative AI models often require large amounts of data for training. Privacy concerns arise when sensitive or personally identifiable information is used Read more…

How is an API security tested?

API security testing is an essential part of ensuring the integrity and protection of an API (Application Programming Interface). Here are some common methods and techniques used to test API security: Input Validation: Test the API for proper input validation to prevent common security vulnerabilities such as injection attacks (e.g., SQL injection, command injection). Verify that the API rejects or sanitizes invalid or malicious inputs. Authentication and Authorization: Test the Read more…

What to Consider in Security Assessments for Large Cultural Events

Cultural events such as music festivals can pose a significant security challenge. Several factors need to be considered to ensure the safety and well-being of attendees. Here are some key considerations: Threat Analysis: Assess potential threats specific to the event, such as terrorism, crowd-related incidents, theft, vandalism, and drug-related issues. Consider both external and internal threats. Venue Selection: Evaluate the suitability of the venue in terms of size, layout, accessibility, Read more…

It is Time to Invest in Digitally Enabled Resilience Programmes

Organisations are increasingly looking to technology as an enabler of their resilience programmes. Why? Because, by facilitating the aggregation of data across business continuity, (BC), operational resilience (OpRes), crisis management, risk and third-party teams, technology can solve many of the pain points faced, whilst improving the quality of best practice and change programmes overall. Technology enablement of their programmes is becoming a key priority. Companies are starting to understand the Read more…

What is the Cyber Kill Chain and MITRE ATT&CK?

The cyber kill chain, also known as the Lockheed Martin Cyber Kill Chain, is a concept and framework used in the field of cybersecurity to describe the stages of a cyber attack. It provides a systematic approach to understanding and countering the various steps involved in a typical cyber attack. The concept was initially developed by Lockheed Martin in 2011. The cyber kill chain consists of several stages or steps Read more…

How to Conduct a Business Impact Analysis

Conducting a business impact analysis (BIA) is an important step in assessing the potential effects of disruptions on your business operations. It helps you identify critical processes, prioritize resources, and develop appropriate recovery strategies. Here’s a step-by-step guide to conducting a BIA: Define the scope: Determine the boundaries of your analysis. Identify the business units, departments, or processes that will be included in the assessment. Identify critical business objectives and Read more…