INTELLIGENCE > > International


« Back to News

2015-04-09

Middle East: Cyberwar Heats Up

Two new malware campaigns have been spotted in the Middle East.

2015-04-16

Interpol Cyber Research Identifies Malware Threat to Currencies

Interpol has identified a threat to the blockchain in virtual transactions, which could result in their being embedded with malware.

2015-03-31

Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

2015-03-30

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has acknowledged that its intelligence community have specialized units for waging cyber-war.

2015-03-24

Despite Snowden Leaks, Internet use is Largely Unchanged

Some Internet users worried about protecting their privacy have made basic changes to their online activities, most have not.

2015-03-25

Snowden: IT Workers Are Now the Target of Spies

Speaking at CEBIT, Edward Snowden warns that spy agencies target IT staff to gain access to key elements of internet infrastructure.

2015-03-19

After the Arab Spring, Surveillance in Egypt Intensifies

Egyptian information activists say that government surveillance is getting worse.

2015-03-17

Snowden Appeals to Switzerland to Grant Asylum

Edward Snowden has made a public appeal for Switzerland to grant him asylum.

2015-03-15

Snowden: New Zealand Spying on Pacific Islands

Prime Minister John Key says the security services act in the interests of New Zealand

2015-03-18

Some Email Truths for Hillary Clinton

One thing the US Presidential candidate should know is that armed guards aren’t really equipped to stop a data breach.

2014-12-04

Why REGIN Isn't The New STUXNET

Stuxnet was designed for sabotage, whereas Regin was likely designed for espionage and as a result was deployed with a great deal more of precision.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

Corgea

Corgea

Corgea is AI-powered security platform that finds, triages and fixes your insecure code.

Cyvore Security

Cyvore Security

Cyvore combines cutting-edge AI, machine learning, and behavioral analytics to detect, investigate, and neutralize threats before they compromise your organization.