UK Cyber Security Council open for memberships

The UK Cyber Security Council, the self-regulatory body for the cyber security education and skills sector, has begun accepting applications from organisations for membership. Any organisation with an interest in promoting, supporting and developing the cyber security profession is encouraged to apply. Member organisations will be able to nominate representatives with the relevant skills and […]
GCHQ and HOST launch innovation programme in North West

GCHQ, the UK’s intelligence and cyber agency, is looking for five ambitious businesses to join its pioneering innovation programme to apply trailblazing technologies to national security challenges. The GCHQ Innovation Co-Lab, developed in partnership with HOST, the Home of Skills & Technology, is aimed at UK-based digital companies or a consortium of companies with innovative […]
There’s a place for you at the Total Security Summit

There’s a free place reserved for you at the upcoming hybrid Total Security Summit – make sure you claim it! 12th & 13th October – The Queens Hotel, Leeds As our guest, you can enjoy live industry seminar sessions, a bespoke itinerary of 1-2-1 meetings with innovative suppliers & networking with peers. Overnight accommodation, all meals […]
Do you specialise in IP/IT Security? We want to hear from you!

Each month on Security Briefing we’re shining the spotlight on a different part of the security market – and in September we’ll be focussing on IP/IT Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help security buyers find the best products and services available today. So, if you’re a supplier of IP/IT […]
Dstl event showcases next-gen crime-fighting tech

The Defence Science and Technology Laboratory (Dstl) has hosted an event to encourage free thinking by showcasing new science and technology that could help fight crime and terrorism. Among the science displayed to senior officials from the National Police Chiefs’ Council and the Home Office was Gravity, a human jet suit system. The pilot swooped in, […]
Physical security for data centres to hit $1bn by 2026

The data center physical security market is expected to grow at a CAGR of over 7.42% during the period 2020−2026, to hit sales of $1,045.9m by the end of the forecast period. That’s according to a new report from Arizton Advisory & Intelligence, which says: The global physical security market is growing due to an […]
100% of companies have experienced a security incident within public cloud in past year

A report has found 100% of companies surveyed experienced a security incident, but continue to expand their footprint as 64% report deploying new AWS services weekly. Vectra AI has released the findings of the PaaS & IaaS Security Survey Report, which compiles the answers of 317 IT executives all using AWS, with 70% coming from […]
Get ahead with business continuity at the Total Security Summit

Business continuity is the hot topic within the security industry, as well as risk management – the Total Security Summit can help you to explore the latest innovations, including: Access Control, Biometrics, CCTV, Business Continuity & Risk Management, IP / IT Security, Lone Worker Security, Loss Prevention Solution and many more. DATE: 12th & 13th October […]
The Future Workplace – Making it seamless and secure

After many months of changing lockdown rules where companies have had to implement remote and hybrid working policies accordingly, businesses are looking to the future beyond COVID-19 as workforces return to their offices. But what will the future workplace look like? According to new research, businesses have found that their employees prefer a mixture of […]
Exotic programming languages making malware increasingly tough to spot

For defenders to maintain a competitive advantage over attackers, it’s important to recognize emerging trends by threat actors. One such trend BlackBerry has observed in 2021 is the practice by malware authors of leveraging new and uncommon programming languages to evade detection and hinder analysis. Malware authors have a reputation for being slow to change […]