INTELLIGENCE > > International


« Back to News

2019-01-29

Europe’s Most Hackable Election

Three years after Russian disinformation disrupted the 2016 US presidential election, the EU faces big risks as it gears up for a vote in May.

2019-01-25

Australian Defence Chief Issues Cybercrime Warning

Australia's military chief has warned European officials of the ever-present threat posed by cyber espionage and intellectual property theft.

2019-01-21

Zimbabwe Orders Internet Disconnected

The government in Zimbabwe has responded to widespread protests over rising fuel prices by cutting off the nation's wireless & internet services.

2019-01-04

China’s Hackers Have Stolen EU, US & Global Secrets

APT10: A China-based hacking group well known to the information security community has been hacking the rest of the world since 2014.

2018-12-27

5G Mobile Technology Poses An Espionage Risk

Next generation 5G mobile internet promises much greater connectivity, but Canada's spy chief thinks it will facilitate state-sponsored espionage.

2018-12-20

Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures

Russian actors launched coordinated cyber-attacks against Ukraine before the seizure of Ukrainian ships in the Kerch Strait.

2018-12-11

British Telecom Is Stripping Huawei Out Of Its Network

BT is to strip all Huawei equipment from its core 4G network and prevent the Chinese equipment vendor from bidding for core 5G network contracts.

2018-12-18

Cyber Weapons Are Proliferating Beyond Control

Cybersecurity is quickly moving beyond the pure financial impact to concerns over public safety, national security and even cyberwarfare.

2018-12-10

Russian Cyber Operations: State-led Organised Crime

Russia is emulating approaches used by cyber-criminals as it blurs the line between state and non-state activities in cyberspace.

2018-12-06

Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

The crisis triggered by the maritime clash in the Black Sea has brought widespread denunciations of Russian aggression. What happens next?

2018-11-29

Cyber Attacks On Australia Reveal A Pattern

Skip R&D, go straight for the IP: China is breaking an agreement with Australia not to steal each other's commercial secrets.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Omerta IT

Omerta IT

Omerta IT help you protect your organisation by helping ensure you have the best IT Security professionals working for you.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.