INTELLIGENCE > > Europe


« Back to News

2019-04-25

Huawei To Be Given 5G Contracts In The UK

The British government looks ready to grant the Chinese tech giant eligible status to supply all “non-core” infrastructure related to the network.

2019-04-08

The EU’s Copyright Directive Risks Creating Two Internets

The EU Parliament’s approval of the Copyright Directive creates substantial new controls on what can be shared online. That's a problem.

2019-03-12

Huawei 5G Risk Can Be ‘Contained’

Britain's spy agencies believe the threat of espionage arising from Huawei's 5G engineering and security capabilities can be managed.

2018-12-14

NCSC Aims To Inspire Young Female Code-Breakers

The British National Cyber Security Centre has a competition to inspire the next generation of cyber security experts... and it's just for girls.

2018-12-07

Germany Detects New Russian Cyber-Attack

A cyber-attack on the email accounts of German lawmakers, the military and several German embassies by the Russian hacker group Snake.

2018-12-05

GCHQ Doesn't Always Tell Vendors If Their Software Is Vulnerable

GCHQ has a special team to search for flaws in different types of computer software and systems. They don't always disclose what they find.

2018-12-05

Britain's Top Soldier Warns Of Russian Threats

The head of the British army says Russia is now a "far greater threat" to the UK's national security than the Islamic State terror group.

2018-11-26

GRU: Spies Without Borders

How were two undercover GRU officers able to obtain visas to travel to the UK to poison and attempt to kill Sergey and Yulia Skripal ?

2018-11-05

Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, because of a shortage of 50,000 cybersecurity specialists.

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Cydome Security

Cydome Security

Cydome offer solutions to protect your sensitive data even when it leaves the organization perimeter.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service — basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

Authenteq

Authenteq

Authenteq provides an Omni-Channel identity verification and KYC solution that allows your customers to verify their identity through any channel without compromising their privacy.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Arqit

Arqit

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.