INTELLIGENCE > > International


« Back to News

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

2016-11-09

Was North Korea Behind The IoT DDoS Attack?

Multiple big-name sites, including Twitter, Spotify and GitHub, experienced slowdowns in an attack against DNS services took shape.Was it N. Korea?

2016-10-31

ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-26

British Military Is Using Cyber Warfare Against Islamic State

The UK admits using cyber warfare techniques in the fight against Islamic State for control of the Iraqi city of Mosul.

2016-10-20

Women Suspected To Attempt Next Terror Attack

After a string of arrests of radicalised women, Europe is preparing for the next IS inspired terror attacks to be carried out by female assassins.

2016-10-17

NATO’s Cyber-Capabilities Are Only Defensive

NATO's ability to respond offensively to Cyber-attacks is hindered by its previous inaction and inherent difficulties surrounding Cyber defense.

2016-10-14

Cyber Threats To Israel’s Air Traffic Control

Cyber-attacks on Israeli infrastructure are constant and may now include air traffic control installations.

2016-10-12

AI Is Replacing Human Made Decisions In The US Military

A new survey of existing weapon systems finds that AI is increasingly used to replace humans, not just helping them.

2016-10-13

A New Front In The Business Of Political Espionage

The days of spies trying to get their hands on state and trade secrets are still alive and well today. Except, now they’re digital.

2016-10-04

Cybersecurity Start-Ups Working With GCHQ

The UK's top security startups are invited to work with GCHQ in an effort to help protect against hackers and cyber attackers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.