INTELLIGENCE > > International


« Back to News

2016-06-28

False Flags: The Kremlin’s Hidden Hand

The notorious hacking gang calling itself the Cyber Caliphate might not be what it claims to be.

2016-06-29

The Cyberwar Frontier In Korea

North Korea's "cyber army" has doubled in size to 6,000 troops and the South is racing to increase its capability to meet the rising threat.

2016-06-29

Hackers Target Vulnerabilities Across US Politics

Russian hackers have burrowed deep into the US political system, sweeping in law firms, lobbyists, consultants, foundations and think tanks.

2016-06-27

NATO Tools Up For Cybewar

Just like air, sea, land and space, now cyberspace is officially considered a likely battlefield by the world's biggest military alliance.

2016-06-21

ISIS Developing Driverless Cars

Islamic State in Syria (ISIS) technicians are working to develop a Google-style driverless car that could navigate itself.

2016-06-20

Facial Recognition Prevents Terrorist Attacks

Facial recognition systems need both images and a searchable database. Advances in Iris scanning technology make this process easier.

2016-06-19

Iran Wants To Collect All Social Network Data

The Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country.

2016-06-14

How To Define Cyberwar

What is it that is keeping US Intelligence and Military chiefs awake at night?

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-06-13

Spying With Nano Robots Disguised As Insects

Spy technology emulates nature to develop successful controlled flight of a biologically inspired, insect-scale robot.

2016-06-07

Open Source Intelligence Can Predict Terrorist Attacks

Predata specialize in finding links between online interactions and upcoming physical events using metadata from YouTube and Wikipedia

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

TAC Security

TAC Security

TAC Security is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.