Modern Listing Example
Thinking before we click: the unseen face of online security
By Kema Rajandran When Karen Stones left school at the young age of fifteen, she…
Data Centres – a Weak Link in Counter Terrorism?
By Angela Toh Many organisations have taken constructive action against terrorist attacks, through security screening,…
Mandatory Breach Disclosure Part 1 – The case for Mandatory Breach Disclosure
The case for mandatory breach disclosure is building with an increasing number of large, high profile…
The politics of protection and privacy
By Adeline Teoh The privacy versus security debate is not just about rights and metadata…
Know your enemy, but know yourself too
By Stuart Clarke, Director of Cybersecurity & Investigation, Nuix Information security experts and practitioners are…
Smarter Surveillance: Managing Risk with Business Intelligence
By Kevin Wine, Vice President of Marketing, Verint Video and Situation Intelligence Solutions The need…
Towards security professionalisation: The cultural journey to employ and develop future security professionals
By Michael Coole & Dr. David Brooks, Edith Cowan University The security industry and its…
Talking Trauma
By Adeline Teoh Depictions of post-traumatic stress disorder (PTSD) often centre on the deterioration of…