INTELLIGENCE > > International


« Back to News

2015-08-14

Malaysia: Umno members told to go on ‘cyber war’

Social Media leads the contest as politics in Malaysia turn nasty.

2015-08-14

Twitter says U.S Government Want More User Account Information

Twitter reveals that requests for account information from governments has jumped 52%, mostly to do with criminal investigations.

2015-08-14

France & UK on the Edge of Kafkaesque Surveillance

Are the surveillance tools that France and Britain are using too blunt and intrusive for modern democracies?

2015-08-14

ECHELON Has Been Watching You All Your Life

40 Years Later: PRISM and XKeyscore are the current manifestations of ECHELON

2015-08-10

Global Spy System ECHELON Confirmed by Snowden Leak

History by Duncan Campbell: Leaked Snowden files finally confirm the existence of the ECHELON intercept project.

2015-07-28

Will Enforcing Encryption Backdoors Even Work?

Backdoors are “unworkable in practice, raise enormous legal and ethical questions & would undo progress on security...'

2015-07-21

IS uses Encrypted Apps says FBI Chief

Security forces cannot access the encrypted platforms being used by Islamic State to recruit lone-wolf terrorists.

2015-07-16

NATO missile system hacked remotely by ‘foreign source’

A German Army Patriot missile system was allegedly hacked by a remote source.

2015-07-13

Terrorists’ Social Media Output Under Scrutiny

UN panel asks social-media companies to respond on how terrorist groups use their networks to spread propaganda.

2015-07-02

Merkel Bugged While Pondering Greece Crisis

Wikileaks release evidence that Chancellor Merkel's telephone calls are still being tapped.

2015-06-29

China Security Bill Calls for ‘Cyber Sovereignty’

The bill calls for “cultural security” & improving socialist education to prevent the “infiltration of unhealthy culture.”

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.