INTELLIGENCE > > International


« Back to News

2015-04-09

Snowden Explains Exactly How the US Government Can Get Access to Private Images

The public don’t understand what ‘bulk government surveillance’ actually means.

2015-04-09

Middle East: Cyberwar Heats Up

Two new malware campaigns have been spotted in the Middle East.

2015-04-16

Interpol Cyber Research Identifies Malware Threat to Currencies

Interpol has identified a threat to the blockchain in virtual transactions, which could result in their being embedded with malware.

2015-03-31

Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

2015-03-30

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has acknowledged that its intelligence community have specialized units for waging cyber-war.

2015-03-24

Despite Snowden Leaks, Internet use is Largely Unchanged

Some Internet users worried about protecting their privacy have made basic changes to their online activities, most have not.

2015-03-25

Snowden: IT Workers Are Now the Target of Spies

Speaking at CEBIT, Edward Snowden warns that spy agencies target IT staff to gain access to key elements of internet infrastructure.

2015-03-19

After the Arab Spring, Surveillance in Egypt Intensifies

Egyptian information activists say that government surveillance is getting worse.

2015-03-17

Snowden Appeals to Switzerland to Grant Asylum

Edward Snowden has made a public appeal for Switzerland to grant him asylum.

2015-03-15

Snowden: New Zealand Spying on Pacific Islands

Prime Minister John Key says the security services act in the interests of New Zealand

2015-03-18

Some Email Truths for Hillary Clinton

One thing the US Presidential candidate should know is that armed guards aren’t really equipped to stop a data breach.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Secure-ly

Secure-ly

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is responsible for the security of critical information infrastructures in Afghanistan.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.