INTELLIGENCE > > International


« Back to News

2018-04-04

Staying One Step Ahead Of The Cyber Spies

Growth Market: GCHQ estimate that 34 separate nations have serious, well-funded cyber espionage teams targeting friends and foes alike.

2018-03-22

African Union HQ Building Bugged

Allegations of embedded espionage at the African Union’s HQ might prompt leaders to be more cautious about Chinese investment proposals.

2018-03-05

Russian Spies Hacked The Korean Olympics

Russian military spies hacked hundreds of computers at the Pyeongchang Olympic Games in a “false-flag” operation, US analysts claim.

2018-02-20

Discover Your Inner Spy

Spyscape: New York has a new museum, designed by a British intelligence officer, giving visitors a taste of life as a secret agent.

2018-02-16

Inspired: China Measures Citizens' Trustworthiness

China is exploring how AI & Big Data can be used to monitor social media interactions and has plans to assign citizens a 'social-reliability' rating.

2018-02-15

Islamic State Likely To Switch To Cyber Warfare

Along with other terrorist groups IS are turning to the cybercrime underworld to secure tools to carry out attacks on critical infrastructure.

2018-01-19

Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'

The Russian military says it has fought off an attack by a swarm of drones launched by jihadists against its Tartus airbase in Syria.

2018-01-09

Canada’s Electronic Spies Unleashed

Sweeping new powers are proposed to enable Canada's security establishment to eavesdrop and launch offensive operations. Not everyone is happy.

2018-01-02

When Terrorists Learn How to Hack

Terrorist groups are expanding their use of the Internet beyond disseminating operational know-how. They are building threatening new hacking tools.

2017-12-29

Chinese Hacker Groups Shift Focus To India

Experts at FireEye say they expect to see Chinese APT groups focusing more attacks on India in 2018.

2017-12-22

US Defense Contractors Stole Images From UK Secret Surveillance Station

In a major embarrassment to US & UK military authorities, architects disclosed top secret images of the RAF Croughton SIGINT interception centre.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.