INTELLIGENCE > > International


« Back to News

2018-11-15

Neither US, Russia Or China Will Sign Macron's Cyber Pact

Three of today's major cyber-powers have not signed an agreement on rules and principles proposed by French President Emmanuel Macron.

2018-11-12

Edward Snowden Issues Surveillance Warning To Israelis

Speaking from Moscow, Edward Snowden has urged an Israeli audience to be on guard against heavy-handed government & private surveillance.

2018-11-09

USA & China Named As Top Cyber-Attack Sources

Of 27 million attack sources analysed by NSFOCUS in H1 2018, attacks emanating from China, the USA & Russia were predominant.

2018-10-15

Cyberattack Revelations Appear To Undercut Russia's UN Efforts

Russia is planning to submit two UN resolutions later this month, one regulate states behaviour in cyberspace and one on a cybercrime convention.

2018-10-08

China Compromises Tech Companies With Malicious Microchips

Has the Chinese military really implanted malicious microchips in motherboards used by almost 30 US companies and intelligence agencies?

2018-10-05

US Offers Its Cyber Secrets To NATO

The US is shortly expected to announce that it will offer its cyber warfare capabilities on NATO's behalf as it acts to counter Russian aggression.

2018-10-05

Russia Stands Accused Of Global Hacking Campaign

Russia is running a hacking campaign to undermine democracies, targeting institutions from sporting bodies to the chemical weapons watchdog.

2018-10-02

The Image Of Julian Assange Grows Darker

The architect of WikiLeaks depicts himself as an heroic fighter for the cause of transparency, but that image is getting harder to take at face value.

2018-10-01

NATO Can’t Agree On What A Cyber Attack Is

NATO member states have not reached consensus on how to actually count and categorise cyber incidents across the alliance.

2018-09-21

Spyware Proliferates To 45 Countries

Pegasus spyware, which targets iPhones and Android devices, has infiltrated numerous countries where its is used to abuse human rights.

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Internap Corporation (INAP)

Internap Corporation (INAP)

INAP is a global provider of high-performance data center and cloud solutions, partnering with customers worldwide to create secure and scalable IT infrastructure solutions.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Inside-Out Defense

Inside-Out Defense

Inside-Out Defense is a privilege governance platform built for Continuous Validation of Trust. We make it possible to govern access privileges in real-time across your multi and hybrid environments.