INTELLIGENCE > > Europe


« Back to News

2018-12-05

Britain's Top Soldier Warns Of Russian Threats

The head of the British army says Russia is now a "far greater threat" to the UK's national security than the Islamic State terror group.

2018-11-26

GRU: Spies Without Borders

How were two undercover GRU officers able to obtain visas to travel to the UK to poison and attempt to kill Sergey and Yulia Skripal ?

2018-11-05

Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, because of a shortage of 50,000 cybersecurity specialists.

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

2018-10-04

Britian Accuses Russian GRU Spy Agency Of International Cyber Attacks

The UK government has directly accused the GRU military intelligence agency of being behind a wave of “reckless and indiscriminate cyber-attacks”

2018-10-01

Smartphones Are Working For Dutch Police

The Dutch National Police issued its officers and staff with 63,000 smartphones, creating numerous opportunities to do things differently.

2018-09-24

Former MI5 Chief Wants Retaliatory Attacks On Russia

Ex security chief Stella Rimington urges Britain to meet Russian "aggression with aggression" and launch retaliatory cyber attacks against Moscow.

2018-09-21

UK Gets Offensive: New Task Force To Deal With Russia & Terrorists

Britain will step up its counter offensive against threats from Russia and terrorist groups with a joint task force between the MoD and GCHQ.

2018-09-14

GCHQ Data Collection Violated Rights To Privacy

GCHQ’s methods of bulk interception of online communications violated privacy rules and failed to provide sufficient surveillance safeguards.

2018-09-13

Britain Plots Cyber Revenge On Russia For Novichok Poisonings

Britain and its allies promise revenge on Vladimir Putin’s regime for the Novichok attack believed to be carried out by Russian secret agents.

2018-08-03

Germany Wants A Legal Framework For Cyberwar

In response to domestic intelligence reports of surging nation-state attacks against it, Germany wants to actively respond to acts of cyberwar.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

SAP

SAP

SAP is a multinational software company. Security software includes Application & IT Infrastructure Security; Identity, Access & Authentication Management.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Emerging Payments Association (EPA)

Emerging Payments Association (EPA)

The Emerging Payments Association (EPA) is a commercial membership association of payments industry influencers.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

DH2i Company

DH2i Company

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.