more counter terror features.....

Back to the future on Terrorism

Former CIA intelligence analyst Mat Burrows looks at global terrorism trends in his new book The Future Declassified. Here he examines the wider issues shaping unrest in the Middle East

Counter Terrorism Strategyread more
Mounting a response to the digital hijack threat

Amar Singh of international IT governance association ISACA reports on the damage denial of service (DoS) attacks can do and shares advice on how organisations can protect themselves

Cyber Terrorismread more
Protecting services from cyber attacks

The Security Institute’s Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the technological supply chain

Cyber Terrorismread more
A holistic approach to Air Cargo Security

With 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance against a backdrop of international terrorism.

Aviation Securityread more


counter terror case studies.....

The Impact of the Internet of Things on Critical Infrastructure Protection

By:  Travis Greene, Identity Solutions Strategist, NetIQbr/>Massive retail and financial breaches have become an almost-weekly occurrence, driven by the potential financial gains for hackers who profit handsomely from the theft of account information. Yet, thankfully, we have not seen similar successful attacks on critical infrastructure, such as power generati [ ... ]

Communicationsread more
Counter Terror Training with ISSEE

Terrorism, from whatever religious, political or ideological goal, is designed to strike fear into the hearts and minds of the population.

Communicationsread more
Man and Machine CAD Training Academy

Our goal is to help you optimise your design process. Whether you are in the manufacturing, engineering, architecture, plant or construction industries, we have the experience to understand your business and what you are trying to achieve, and we have the expertise to enable you to do it better

Communicationsread more
Cyber should be defined as the exploitation or protection of digital data

Cyber is an important component, but only a component, of Information Assurance (IA). IA is closely allied to more traditional business risk strategies and their governance.

Communicationsread more
Advanced Machining Products

Here at Advanced Machining Products (AMP) we are heavily involved in the cutting technology of complex materials.

Communicationsread more
Eaton’s Security business: Investing in Prevention with Menvier

Eaton’s Security business, a business unit of diversified power management company Eaton, is now firmly positioned as a leading manufacturer of security equipment for all types of commercial and residential premises.

Communicationsread more
Fail to Prepare, Prepare to Fail?

The world today faces a persistent threat of crises that could bring it to its knees in the blink of an eye. When an incident occurs, whether it’s a natural disaster, an IT or power outage or a terrorist attack, industries and government sectors need contingency plans.

Communicationsread more
DMS Protective Equipment - Scorpion Protective Armour

It is an unfortunate fact that in the early 21st Century the need for PPE amongst police and security forces is greater than ever. Indiscriminate acts of violence can break out at any time, which is why Police and Security Forces worldwide are choosing lightweight and easily deployed Personal Protective and Light Trauma Equipment for speed and safety.

Communicationsread more
Renfrew Group International

A multi specialised design innovation and product development consultancy

Communicationsread more
Phoenix Datacom

Your Cyber-Security Partner with Security & Developed Vetting Cleared Security Professionals

Communicationsread more


counter terror events.....

World BORDERPOL Congress

9-11 December 2014
Budapest, Hungary
The 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together leaders of the world’s border security establishments to discuss some of the latest challenges facing our borders and the agencies tasked with protecting and managing them

Exhibitionsread more
Cyber Defence & Network Security UAE

8-10 December 2014
Rosewood, Abu Dhabi, United Arab Emirates

Cyber Defence and Network Security UAE (CDANS) is a two day summit focussing on the increasing move towards the inclusion of big data analytics and cyber forensics in government cyber security in the UAE.

Exhibitionsread more
Transport Security Expo

2-3 December 2014
Olympia, London

Transport Security Expo has been the leading event for global heads of Aviation, Maritime, Counter Piracy, Public Transport and Supply Chain Security for the past 10 years.

Exhibitionsread more
The Commercial UAV Show

21-22 October 2014
Level 2, Olympia, London, UK
The first marketplace for commercial unmanned aerial vehicles. Whatever your commercial UAV end goal, you can achieve it at The Commercial UAV Show.

Exhibitionsread more