Hardware Encryption

  The HSM concept The basic idea behind a hardware security module 3D approach to HSM 3 dimensional security Philosophy Simply secure   The HSM Concept Because business-critical information of all kinds needs reliable protection against unauthorised access, manipulation, and theft, IT security is one of management’s most important tasks... Read more

Lawful Interception

  Challenges to lawful interception Regulatory environment National laws Solution considerations   Challenges to Lawful Interception With a worldwide landscape characterized by entirely new forms of electronic communication the nature of lawful interception (LI) has changed substantially. Regulatory mandates implemented in many countries present a significant challenge to the telecommunications... Read more

MEPs Call for Private Security Regulations

Private security companies (PSCs) in Europe should be regulated by the EU to ensure compliance with international conventions and human rights, a bloc of both conservative and socialist members of the European Parliament have argued. Growing support for such measures was evident during a European Parliament sub-committee on defence and... Read more

NATO Edges Towards ACCS Software Validation

After years of initial cost overruns, delays and interoperability problems, NATO’s Air Command and Control System (ACCS) is entering the final stretch of software testing and validation, with national-level replication sites beginning to roll out across the alliance. Although some data-exchange interoperability problems continue to beleaguer the system, ACCS is... Read more

Name Data Strengthens Border Security

Data is an essential resource in the fight against terrorism, organized crime and other trans-border criminal activities. Whilst legacy Advanced Passenger Information Systems (APIS) have been in use since the late 1980s, the data they provide is often inaccurate, in an unusable format or provided too late to be actionable.... Read more

Page 9 of 10« First...678910