Posts By Author: Neil Fisher

Why Understanding Demographics Will Help Create a United Digital Britain
Security

Are we doing enough to create the right for people to easily express their objections to online crime?

Posted by: on November 14th, 2011


Do We Have the Right Skills to Help Close The Gap Between the Law Profession and Technology?
Security

Many feel that law enforcement needs more resources to monitor criminal behaviour online. Here are three areas which can help progress the debate.

Posted by: on November 9th, 2011


Can Law Enforcement Keep Up With Technology?
Security

In this ever connected world, the public want to know that they and their data are being protected.

Posted by: on November 8th, 2011


Vigilance in an uncertain world
Security

Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.

Posted by: on June 21st, 2011


The Rules of the Road in Cyber-conflict
Security

In military parlance, there are now considered five potential theatres for conflict - land, sea, air, outer space and now cyberspace.In military parlance, there are now considered five potential theatres for conflict - land, sea, air, outer space and now cyberspace.In military parlance, there are now considered five potential theatres for conflict - land, sea, air, outer space and now cyberspace.In military parlance, there are now considered five potential theatres for conflict - land, sea, air, outer space and now cyberspace.In military parlance, there are now considered five potential theatres for conflict - land, sea, air, outer space and now cyberspace.In military parlance, there are now considered five potential theatres for conflict - land, sea, air, outer space and now cyberspace.

Posted by: on June 8th, 2011


Celebrities, Cybercrime, and the Courts
Security

How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?

Posted by: on June 3rd, 2011


The Seismic Security Shift of 2011
Security

Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.

Posted by: on March 1st, 2011


A Year In Aviation Security
Security

Posted by: on December 1st, 2010


Congratulations
Security

It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.It’s my pleasure to congratulate my esteemed colleague, Dr. Gerhard Knecht, on his appointment by SC Magazine as 10th most influential Security Professional in the UK.

Posted by: on November 10th, 2010


Cyber Security – A Tier One Threat
Security

The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.The UK Government’s recent review of national defence and security spending has highlighted an interesting global trend.

Posted by: on November 2nd, 2010


<< Back


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.