Cybersecurity, the NIS Directive and our essential service providers

    The global COVID-19 pandemic has created many challenges for us all. What has become apparent throughout is how reliant society is on the operators of essential services (OESs) and digital service providers (DSPs). In these unprecedented times we have certainly seen some of the OESs being pushed to their limits. This should make us reflect […]

      Defending against cyberattacks in a disrupted world

      To say that we’re living through a turbulent time would be an obvious understatement. Global disruption can force populations to rethink how they operate, especially when it comes to daily routines. Switches to remote working models and restricted movement can lead to increased online activity. Citizens will seek to connect with loved ones, continue work […]

        Access control in smart cities: improving citizens’ security and everyday life

        You often see tragedies in movies where criminals take control of a city by hacking the network and changing traffic lights to create major car incidents. Fortunately, in the real world physical access control acts as fail safe to limit the impact of these incidents, even after a network has been breached. With a growing […]

          Physical security and cybersecurity – are they so different?

          Large organizations will typically have a physical security team and a separate IT team focused on cybersecurity.  Both teams protect the organization’s assets and resources.  So it is natural that one may think that this would make them great friends. The challenge is that the assets and resources are different.  Protection is an obstacle designed […]

            Are retailers doing enough to secure their customer data?

            Retail is constantly transforming, with self-service checkouts, the unmanned grocery store and ‘click and collect’ providing prime examples of the innovative ways in which technology has enhanced retail operations. Yet the systems that sit behind this frictionless shopping experience, with their complex layers of customer data, present a compelling and valuable target for cyber criminals. […]