INTELLIGENCE > > International


« Back to News

2018-06-04

Japan’s Secret Spy Agency

Like any other advanced economic power, Japan operates a significant intelligence and surveillance apparatus. Here is an outline.

2018-05-29

Ecuador Spied On Assange

Trust: Whilst taking refuge in the London Embassy, Assange hacked his hosts network secrets, even although they had him under covert surveillance.

2018-05-10

Australia Points The Finger At Russia For Cyberattacks

Australian intelligence agencies have identified Russia as the actor behind a series of cyberattacks affecting 400 businesses sine 2017.

2018-05-02

AI Increases The Risks of Nuclear War

Artificial Intelligence could destabilise the delicate balance of nuclear deterrence, inching the world closer to catastrophe, according to RAND.

2018-05-03

The Next Russian Cyberattacks Will Be More Damaging

Russia is using cyber warfare methods as part of a wider effort to attack the international system, according to the British Prime Minister.

2018-04-25

Leaked Emails Expose Russian Exploits In Ukraine

Kompromat: A cache of leaked documents seems to show that the Kremlin is prepared to pay for hacking, propaganda and deception operations.

2018-04-16

Snowden: The Deep State’s Influence On The Presidency

It is 5 years since rogue NSA contractor fled to Moscow where, safe from prosecution, he reflects on the corrupting power of secrecy.

2018-04-10

Cyber Terrorism Will Be A Top Threat By 2020

Nation-state sponsored cyber terrorism will be a top threat by 2020 and those organisations incapable of responding quickly will crumble.

2018-04-04

Snowden Says Social Media Is Surveillance 'Rebranded'

Edward Snowden thinks that social media platforms have deceived their users and are, in fact, the same as surveillance companies.

2018-04-04

Staying One Step Ahead Of The Cyber Spies

Growth Market: GCHQ estimate that 34 separate nations have serious, well-funded cyber espionage teams targeting friends and foes alike.

2018-03-22

African Union HQ Building Bugged

Allegations of embedded espionage at the African Union’s HQ might prompt leaders to be more cautious about Chinese investment proposals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CloudDNA

CloudDNA

cloudDNA is the only dedicated Citrix NetScaler consultancy in EMEA. We can help your migration to NetScaler secure networking solutions.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Crypteia Networks

Crypteia Networks

Crypteia Networks delivers a patent-pending technology that identifies zero-day threats along with misconfigurations on already deployed defenses.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Elron Electronic Industries

Elron Electronic Industries

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are Medical Devices and Cyber.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.