INTELLIGENCE > > International


« Back to News

2017-08-04

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles

For a country that’s as “off the grid” as you can get, North Korea is remarkably plugged in to cyberwarfare.

2017-08-03

Cyberterrorism: The Next Threat From Islamic State

While powerful hacking tools are readily available to purchase on the dark web, a combination of cybercrime and jihadism is a likely future threat.

2017-07-31

Hunters Take Down Terrorists On The Internet

Freelancers are hunting down terrorist content across social media platforms and messaging apps, doing a job the tech companies don't.

2017-07-18

Reinventing Cold War Spy Craft

State-sponsored hackers are adopting classic espionage techniques which are being reinvented for the modern era of spying.

2017-07-17

Cyber Caliphate's Scorecard

The Cyber Caliphate is really good at social media & communications but is still learning when it comes to cyber-attack expertise.

2017-07-11

Ukrainian Security Call in FBI, NCA & Europol

Ukraine's SBU security service calls in international help & has branded the hugely damaging Petya attack an “act of cyber-terrorism”.

2017-07-03

Ten Years Since The Outbreak Web War One

Estonia was the first victim of cyberwar and a decade later we are still grappling with the new era of increasingly sophisticated digital weapons.

2017-06-29

Does Canada Need Its Own CIA Or MI6?

Canada is the only G7 country without both a dedicated domestic and a dedicated foreign intelligence agency. Up until now.

2017-06-20

WikiLeaks Releases More Info On CIA Malware

Codenamed Pandemic, this ingenious CIA tool targets computers with shared folders, from where users can download files via SMB.

2017-06-19

Israeli Hackers Have Penetrated ISIS Networks

Israeli hackers have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines.

2017-06-09

Islamic State's Social Media Strategy

So called Islamic State is fighting on many fronts and puts media warfare on a par with its battle on the ground.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

BIA

BIA

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

SISA

SISA

SISA is a payment security specialist providing payment security assurance services, training and products to over 1,000 customers across the globe.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

oneKIY

oneKIY

KIY is an advanced user-control security key which you will use for authentication, secure data and files.

Sabat Group

Sabat Group

Sabat Group provide relationship-driven information security & cyber security recruiting services.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.