INTELLIGENCE > > International


« Back to News

2022-12-21

Cyber Threats & Nuclear Fears

Cyber-Nuclear Nexus: The question that surrounds cyber war is not whether it is possible, but what will be the targets of these operations?

2022-10-19

British Spy Chief Warns Of The Threat From China

Britain's GCHQ spy agency chief says Western countries face a "huge threat" from China exploiting tech dominance to control its own citizens.

2022-10-17

Developing Nations Face The Biggest Cyber Security Challenges

Digital Connectivity: The openness of the Internet requires all nations to have effective cyber security policies to have a safe, secure Internet.

2022-08-17

CISA & ACSC Name 2021’s Top Malware

New Capabilities & Evading Detection. The top malware types include RATs, banking Trojans, information stealers and ransomware. 

2022-06-27

Russia Escalates Spying On Ukraine’s Allies

Russian state-backed hackers have been identified as conducting espionage against 128 organisations in 42 countries allied to Ukraine.

2022-05-30

Can A Cybercrime Convention For All Be Achieved?

International Rules: A new UN cybercrime treaty process is raising strong awareness about one of the biggest global challenges. By Joyce Hakmeh

2022-05-04

Five Eyes Warn Of Russian Cyber Attacks

Five Eyes intelligence call for immediate action by critical infrastructure organisations to “prepare for and mitigate potential cyber threats”.

2022-04-09

Cyber Security: GCHQ's Director Speaks Out

Britain's spy chief explains how events in Ukraine, the advance of China and COVID convinced him that national cyber security must get better.

2022-03-07

Russia's Top Spy Agency Runs Fake News At Home

The GRU military intelligence agency is behind many effective domestic online operations and is probably Russia's most capable spy agency.

2022-01-28

Russia's Cyber War Operations Begin

The US & British security agencies are warning organisations to prepare for cyber attacks on critrical infrasructure as Ukraine tensions escalate.

2022-01-24

Red Cross Hacked - Half A Million Victims At Risk

Hackers targeted an external server company that stores names, locations & contact information gathered from 60 Red Cross societies worldwide.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.