SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Counter terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
Counter terror

Counter Terror Trends - Expert Analysis & Insights

Martyn’s Law Is Here: Is Your Organization Ready?
Martyn’s Law Is Here: Is Your Organization Ready?

The terrorism threat in the UK is very real. In fact, since July 2019, the threat level has never dropped lower than “substantial” or “severe.” To ensure preparedness across public places and events, the UK government has introduced the new Terrorism (Protection of Premises) Act 2025, more commonly known as Martyn’s Law in memory of Martyn Hett, a victim of the 2017 Manchester Arena bombing. Overarching aim The new legislation requires operators of public spaces...

Understanding And Implementing Integrated Security
Understanding And Implementing Integrated Security

Integrated security solutions are so often recommended by security specialists, while this sounds impressive, what does it actually mean? The short answer is: combining all aspects of security in a layered approach that leaves no vulnerable points. In this article, I will unpick the meaning behind this well used phrase, exploring the key components that make up an effective integrated security solution, while also revealing my top tips when it comes to maintenance and how to specify a solution...

Why People Will Power Business Security In 2022
Why People Will Power Business Security In 2022

In the era of the ‘Great Resignation’, it may seem counterintuitive to say that people will power business security in 2022. However, a convergence of challenges over the past few years has led to an undeniable trend in the security industry: With more technology comes the need for more people to monitor, analyze and leverage the data that technology produces. Always-on approach to security Since businesses were forced into lockdown two years ago, we’ve seen technology adopti...

The Growing Popularity Of Personal Safety Apps
The Growing Popularity Of Personal Safety Apps

The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery...

The Physical Side Of Data Protection
The Physical Side Of Data Protection

The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centers have become even more critical to modern society. The processing and storage of information underpin the economy, characterized by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centers classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cybe...

Safer Streets Require Real-Time Video Analytics
Safer Streets Require Real-Time Video Analytics

The UK government recently announced a doubling of the Safer Streets Fund to £45 million, as it seeks to reassure the public that safety is a top priority, as the night-time economy makes a return. More than just surveillance While this funding increase is much needed, it’s vital that the government and local councils use the money strategically, or risk missing out on a great opportunity to deliver real change and enhance safety across the United Kingdom. One of the main strategi...

We Have The Technology To Make Society Safer – How Long Can We Justify Not Using It?
We Have The Technology To Make Society Safer – How Long Can We Justify Not Using It?

While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras  Similarly, CCTV is a well-established security measure that many of us are familiar with, wheth...

Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center
Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center

Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...

Trends And Challenges We Will See In The AI-driven Security Space In 2021
Trends And Challenges We Will See In The AI-driven Security Space In 2021

For decades, the nature of global safety has been evolving. From physical security threats like large-scale terrorist attacks and lone actor stabbings to chemical threats such as the Salisbury poisonings and even microbiological threats such as COVID-19, new challenges are constantly arising and the threat landscape we operate in today is constantly changing. Compounding the complexity of the security issues is the complexity and nature of attacks. With the economic downturn, there is the tradi...

Martyn’s Law: Increasing Resilience For Large Venues
Martyn’s Law: Increasing Resilience For Large Venues

Safety and security have always been primary concerns for those running large events and gatherings, such as at concert venues or soccer stadiums. However, the Manchester Arena attack of 2017 highlighted that more should be done to protect those visiting these locations. This is the standpoint taken by Figen Murray, the mother of Martyn Hett – one of the 22 victims of the devastating attack. She has been campaigning for the introduction of stronger counter-terror security measures at...

How To Build An Insider Threat Program
How To Build An Insider Threat Program

Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional...

Development Of Integrated Thermal Imaging Technology Into Evolving Market Verticals
Development Of Integrated Thermal Imaging Technology Into Evolving Market Verticals

Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete...

How To Move From Crisis Response To Crisis Management
How To Move From Crisis Response To Crisis Management

Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms...

The Evolution Of Facial Recognition: From Bodycams To Video Surveillance
The Evolution Of Facial Recognition: From Bodycams To Video Surveillance

Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies arou...

Physical And Cyber Security Precautions When Traveling
Physical And Cyber Security Precautions When Traveling

Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats....

Mass Transit Security Evolves With Modern Security Solutions
Mass Transit Security Evolves With Modern Security Solutions

As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundr...

Mass Security Screening Technology For Large Events
Mass Security Screening Technology For Large Events

Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulne...

Impact Of Sophisticated IT Technologies On The Security Market
Impact Of Sophisticated IT Technologies On The Security Market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being l...

How Atlanta’s New Mercedes-Benz Stadium Sets The Standard For Protection Against Vehicle Attacks
How Atlanta’s New Mercedes-Benz Stadium Sets The Standard For Protection Against Vehicle Attacks

Atlanta’s new $1.5 billion stadium, home to the NFL Atlanta Falcons football team and MLS Atlanta United soccer club and site of the recent NCAA national college football championship, is protecting fans, personnel and athletes from terrorists and errant drivers from using vehicles as weapons. While the threat of terrorists planning to attack soft targets, such as stadiums increases, stadium security professionals, such as those at the new Mercedes-Benz Stadium, must look for the weak poi...

Why Drone Use For Security Will Increase Significantly In 2018
Why Drone Use For Security Will Increase Significantly In 2018

While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilized the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones For Effective Surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate...

Why The Security Industry Is Focusing On Protecting Soft Targets In 2018
Why The Security Industry Is Focusing On Protecting Soft Targets In 2018

  2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilizes the existing WiFi infrastructure in a building to create a personal, mobile safety...

Why Access Control Systems Should Accommodate Older Systems Rather Than Replace Them In 2018
Why Access Control Systems Should Accommodate Older Systems Rather Than Replace Them In 2018

2017 saw an opportunity for the economy to have a strong stock market, which provided companies confidence to invest in and update their infrastructure. This included many replacing older access control systems and moving to more integrated solutions for better connectivity between all security-related systems. We anticipate commercial businesses to invest in infrastructure, which will include security systems and technologies. Each year there is an increase in random violent incidents, w...

How To Prevent Autonomous Vehicles From Being Used By Terrorists
How To Prevent Autonomous Vehicles From Being Used By Terrorists

In recent news, trucks, lorries and vans have been the weapon used in terror attacks around the globe, and other sources suggest that autonomous vehicles, particularly self-driving trucks and lorries, could be a reality sooner than we think. It poses the question: How can we prevent autonomous vehicles from being used as weapons in terror attacks? Accessories For Terror Attacks We already have ‘self-driving’ technologies in the cars which are on our roads today, from lane-departur...

How Terror Attacks Have Driven Demand For A Higher Quality Of Security Training In 2018
How Terror Attacks Have Driven Demand For A Higher Quality Of Security Training In 2018

The demand for security consultancy services has increased as recent terror events have highlighted the need for effective and proportionate mitigation measures. Security training has seen an increase in demand, especially for technical courses in the areas of access control and CCTV.   Security management training has also risen, except in the oil and gas sector where demand dropped significantly; this is attributed to the suppressed oil price. However, recently there are sig...

How To Prepare For Active Shooter Incidents | Infographic
How To Prepare For Active Shooter Incidents | Infographic

This Active Shooter infographic summarises information about trends among active shooter incidents, and outlines how an organization can develop a plan before tragedy occurs, including:   Statistics on the numbers and types of recent active shooter incidents. A profile of common traits among active shooters. How to prepare beforehand, and what to do when the police arrive. How organizational planning ensures maximum preparednes...

How IoT And Cloud-based Security Will Make Cities Safer In 2018
How IoT And Cloud-based Security Will Make Cities Safer In 2018

In 2017 we saw a lot of new construction projects, and many existing buildings upgraded their security systems to include high-resolution cameras and better-quality recording systems. Because the economy is stronger, many businesses and municipalities increased their security budgets for large-scale and public projects due to terrorism threats in public places.   Smart Cities Became More Popular One of the bigger trends we saw in 2017 is the growing popularity of sm...

Top 10: What Were Security Professionals Reading About In 2017?
Top 10: What Were Security Professionals Reading About In 2017?

Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let&rsq...

How Drone Detection Will Protect Cyber Security In 2018
How Drone Detection Will Protect Cyber Security In 2018

Over the past year, there was an unprecedented rise in drone incidents. Drones were unwelcomed at and threatening the physical and cybersecurity of defense organizations, stadiums, corporations, and data centers, among organizations with critical infrastructure. Legislation is only just emerging now, and laws protecting airspace are hard to enforce, especially if a pilot is unaware of the risks of their flight or is flying with malicious intent. Laws can be circumvented, but detection technology...

Perimeters, Entrances And Lobbies To See Increased Security In 2018
Perimeters, Entrances And Lobbies To See Increased Security In 2018

During 2017, we’ve enjoyed stable economic growth for a number of years now; we’re not running into as much resistance for security entrances as we did, say, seven to nine years ago. Hardening Perimeters Against Active Shooters Compared to other security products such as cameras and card readers, security entrances are a big investment and considered somewhat of a luxury: during downturns we’re among the first to hit the “cutting room floor.” Now, however, fueled...

2017 Security Trends: Lone Wolf Terror Encourages Vehicle Access Control System Installations
2017 Security Trends: Lone Wolf Terror Encourages Vehicle Access Control System Installations

With the changing “lone wolf” style of terrorism, there will be a trend toward many more installations of vehicle access control systems and smaller numbers of units. Where a university, military base or airport might have 20-plus systems scattered among its grounds, there will be a growing number of smaller applications needing one, two or three systems. These will include customers such as primary and secondary education facilities; pedestrian locations such as shopping malls, co...

View more
  • «
  • 1
  • 2
  • »
Related white papers
Monitoring Traffic Flow: Everywhere, All The Time

Monitoring Traffic Flow: Everywhere, All The Time

Download
The Critical Importance of Trusted Execution Environment in Access Control

The Critical Importance of Trusted Execution Environment in Access Control

Download
How To Ramp Up Perimeter Security With License Plate Reader Technology

How To Ramp Up Perimeter Security With License Plate Reader Technology

Download
Related articles
Physical And Cyber Security Precautions When Traveling

Physical And Cyber Security Precautions When Traveling

Mass Security Screening Technology For Large Events

Mass Security Screening Technology For Large Events

2018 FIFA World Cup Russia Integrates Safety, Security And Service

2018 FIFA World Cup Russia Integrates Safety, Security And Service

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Counter terror
  4. Expert commentary
About this page

In-depth coverage of counter terror news and the latest security trends in counter terrorism. Read announcements from companies involved in counter terror initiatives and solutions. Experts and thought leaders share their insights and recommendations on counter terrorism matters.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec