INTELLIGENCE > > International


« Back to News

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

2018-08-29

What Is Stuxnet And Who Created It?

Thanks to Stuxnet, we now live in a world where covertly inserted malicious code can destroy machinery and stop (or start) a war.

2018-08-14

Five Eyes Spies Turn To Commercial Innovation

The 'Five Eye' countries are starting to consider leveraging the commercial technology sector to address common national security concerns.

2018-07-30

Snowden Describes Russian Government As 'corrupt'

After 5 years living in Moscow, the reality of his situation is sinking in for the renowned ex-NSA intelligence agency contractor.

2018-07-30

The Cyber Security Intelligence Network

BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber-attacks.

2018-07-20

Snowden – Five Years Later

From safety in Moscow, Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history.

2018-07-20

Top Cyber Spy Warns Against AI

The Chief of the Australian Signals Directorate says spy agencies around the world are increasingly using AI to carry out covert activities.

2018-07-16

Is Cyber The Perfect Weapon?

Millions of intrusions into other countries’ networks occur each year, but only a half-dozen or so have done actual significant physical harm.

2018-07-16

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

Ukraine's intelligence chiefs are convinced Russia is committed to using de-stabilising cyber attacks as tools to extend its international influence.

2018-07-12

Fake Dating Apps Infiltrate Israeli Military

Hamas has a sophisticated spyware operation designed to trick Israeli Defense Force soldiers into downloading malicious apps.

2018-07-06

Theft & Subsequent Re-Use of Cyber Weapons

A year has passed since two widespread and very destructive attacks, both using offensive cyber tools created by the NSA and then stolen.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tanium

Tanium

Tanium delivers Autonomous Endpoint Management (AEM) with the industry’s only true real-time platform for AI.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Axiler

Axiler

Axiler’s AI-driven self-healing architecture seamlessly detect, patch, and neutralize threats in real-time, ensuring systems remain secure and ever-adaptable.