INTELLIGENCE > > International


« Back to News

2016-09-30

What To Know About Space Security

Space is increasingly important to the planet’s infrastructure - but it is also a potential battleground.

2016-09-28

A Peek Into French Signals Intelligence

France’s former top SIGINT spy confirms an advanced persistent threat and opens up about Snowden as well as other intelligence agencies.

2016-09-23

New Cyber Tricks Make ISIS Sophisticated

Terror attacks in Europe have killed more than 200 people in the past 20 months, showing IS has a new operational discipline & technical acumen.

2016-09-14

Mass Surveillance: Cuba Filters Text Messages

Cuba Libre: Mass surveillance mobile telecoms program based on key search terms like 'democracy' and 'human rights'.

2016-09-09

Does Russia Benefit When Assange Reveals Secrets?

Julian Assange and WikiLeaks are back in the spotlight, with new disclosures and a promise of more to come. But who really benefits?

2016-09-13

Canadian Companies Vulnerable To Cyber-Attacks

Canadian organizations aren’t prepared for the rising caliber of attacks, according to Deloitte’s 2015 cyber security survey.

2016-09-19

UAE Using Israeli Spy Technology

The United Arab Emirates uses Israeli malware capable of turning Apple’s iPhones into remote spying devices to clamp down voices of dissent.

2016-09-08

Islamic State Members Embedded In Government

The Kuwaiti interior ministry has arrested a governmental insider for hacking the official websites and spreading the IS propaganda.

2016-08-30

Russian Cyber Spies & Hackers Are The New Normal

Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say.

2016-09-12

China Puts Quantum Encryption Into Orbit

A new satellite designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space.

2016-08-30

Shadowbrokers Steal NSA Hacking Tools

A mystery hacking group says it has stolen the NSA's elite Equation Group's secret toolbox and is selling it to the highest bidder. Who are they?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

National Cyber Security Directorate (DNSC)

National Cyber Security Directorate (DNSC)

DNSC (formerly CERT-RO) is the Romanian national cyber security and incident response team.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.