INTELLIGENCE > > International


« Back to News

2016-01-14

Islamic State Launches A Cyber War Magazine

Islamic State has launched a magazine, 'Kybernetiq' to guide jihadists on how to take part in 'cyber war' including encryption & messaging.

2016-01-06

ISIS Secret Cyber Terrorism Forum Exposed

Discovered using the Telegram messaging app the hidden forum reflects ISIS hackers' growing desire to wage war online.

2016-01-04

Apple Opens Fire In Encryption Battle

On one side, Silicon Valley, arguing that weakening encryption puts privacy at risk. On the other, security services, police and governments.

2016-01-04

NSA Helped UK Spies Find Juniper's Security Holes

GCHQ acquired the capability to covertly exploit security vulnerabilities in firewalls made by Juniper Networks, with the NSA's cooperation.

2015-12-23

Could IS Create A Cyber War?

Critical industries need to significantly ramp up their cyber security or risk having Islamic State hackers attack.

2015-12-16

Kazakhstan: A Poorly Thought-out Surveillance Technique or an Experiment For the West?

Basically, the Kazakh government is snooping at the highest levels on its citizens. Opinion by Christoforus Papachristou

2015-12-15

ISIS Counter-Attack Anonymous

Doxing: Islamic State are hitting back at Anonymous hacktivists

2015-12-28

The True Cost of Surveillance

New legislation to regulate spying in the UK seeks to combine numerous existing powers and make them all subject to coherent oversight.

2015-12-18

Spies Want IBM’s Quantum Computer

One key area where quantum computers could have an impact is encryption and security.

2015-12-09

Cyber War Pre-emption Is The Key to Defense

The United States' best defense against a crippling cyber attack could be a more visible offensive lineup.

2015-12-06

Cyber Warfare Is Integral To Modern International Politics

Cyber-operations are being used for information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.