Hunter Seymour

Security market analyst

Hunter Seymour is a security market analyst with expertise in both the fire and security markets.

Articles by this author

Flashpoint arson alert: Alarming rise in factory and industrial fire hazards

“Contingency” hotel crisis tightens focus on fire risk

Burning decks – Complexities in the rising trend of marine fires

Fuel poverty… A crisis set to spark fire hazards?

Joined-up thinking: How the UK’s approach to national security will require collaboration between the private security sector, public services and government

Retail theft: The growing frontline threat in a cost-of-living squeeze?

Checkpoint for risk: CROSS-UK’s role in collaborative reporting for critical fire safety concerns

Zero tolerance: The impact of Covid on fire safety risk management

The fire safety hazards of ‘quick-fix’ repurposing of commercial buildings for residential housing

Heatwave hazards: How smarter optical beam design can combat the fire detection challenges of buildings under thermal stress

Heightened alert: Combatting the ‘hybrid security threat’ to critical energy and utilities

Opening moves in new UKCA marking scheme face challenging timelines for fire and security markets

Securing heritage sites in a pandemic: Challenges and solutions

Mounting cyber threat to critical infrastructure ramps up UK countermeasures

Defeating shoplifters: Your ‘prevent and deter’ checklist

A pandemic and remote working: Cyber security under the microscope

1 2

Sign up to free email newsletters

Downloads

The 2022 State of Physical Access Control Report

Whitepaper: Reshaping the future of retail with security technology

Whitepaper: Boosting efficiency and streamlining security with an integrated access control solution

Three essential reasons to upgrade your access control technology

Whitepaper: Choosing the right facial recognition solution for access control

The Video Surveillance Report 2021

Whitepaper: Video Analytics Re-imagined – The Impact of Powerful Edge AI

Whitepaper: Effective Techniques for Robust OT Security