The HSM concept The basic idea behind a hardware security module 3D approach to HSM 3 dimensional security Philosophy Simply secure The HSM Concept Because business-critical information of all kinds needs reliable protection against unauthorised access, manipulation, and theft, IT security is one of management’s most important tasks... Read more
Author Archives: SSI Pacific
Lawful Interception
Challenges to lawful interception Regulatory environment National laws Solution considerations Challenges to Lawful Interception With a worldwide landscape characterized by entirely new forms of electronic communication the nature of lawful interception (LI) has changed substantially. Regulatory mandates implemented in many countries present a significant challenge to the telecommunications... Read more
MEPs Call for Private Security Regulations
Private security companies (PSCs) in Europe should be regulated by the EU to ensure compliance with international conventions and human rights, a bloc of both conservative and socialist members of the European Parliament have argued. Growing support for such measures was evident during a European Parliament sub-committee on defence and... Read more
NATO Edges Towards ACCS Software Validation
After years of initial cost overruns, delays and interoperability problems, NATO’s Air Command and Control System (ACCS) is entering the final stretch of software testing and validation, with national-level replication sites beginning to roll out across the alliance. Although some data-exchange interoperability problems continue to beleaguer the system, ACCS is... Read more
Name Data Strengthens Border Security
Data is an essential resource in the fight against terrorism, organized crime and other trans-border criminal activities. Whilst legacy Advanced Passenger Information Systems (APIS) have been in use since the late 1980s, the data they provide is often inaccurate, in an unusable format or provided too late to be actionable.... Read more