INTELLIGENCE > > International


« Back to News

2016-04-21

‘Eye In The Sky’: The Reality Of Drone Warfare Revealed

‘Eye in the Sky’ is a thrillingly intelligent exploration of the political and ethical questions surrounding drone warfare.

2016-04-21

DARPA Has Invented The Ultimate Cyber Security

US Defense research organisation DARPA has spun off a new project called High-Assurance Cyber Military Systems.

2016-04-20

The Spies Of tomorrow Love Data…

Working in an age where everything is recorded and leaves a digital footprint requires different tradecraft.

2016-04-12

Islamic State Recruits Indian Hackers

Islamic State is recruiting hackers in India to break into government systems and paying them over $10,000 for every job they do.

2016-04-12

Israeli Drone Hacked By Five Eyes Intelligence

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist” operating from Cyprus.

2016-04-11

Taliban App Removed From Google Store

Alemarah, an app for Android phones created by Islamist fundamentalist group the Taliban, has been removed from Google's Play Store.

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

2016-04-06

Thought Experiment: Predicting Cyber War

There are no historical models for full scale Cyber War - what would it be like and how might it be to conducted?

2016-03-31

Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there. No easy task.

2016-03-22

North Korea Denies Cyber Attacks On South Korea

North Korea denies it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

2016-03-18

Fighting The Invisible War In CyberSpace

Cyberattacks can damage critical infrastructure, steal government secrets and even retaliate against private companies for political reasons.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Norsk Akkreditering

Norsk Akkreditering

Norsk Akkreditering is the national accreditation body for Norway. The directory of members provides details of organisations offering certification services for ISO 27001.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

AgilePQ

AgilePQ

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.