INTELLIGENCE > > International


« Back to News

2021-02-25

GCHQ Jammed ISIS Drones & Servers

A secret cyber operation which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

2021-02-03

Enemy Action - The Distinctive Features Of Cyber Warfare

Operating behind false IP addresses, foreign servers and aliases, attackers can act with almost complete anonymity and relative impunity.

2021-01-15

Spies In Cyberspace

The United States government is one among many that need to radically improve their national security strategies against cyber espionage.

2021-01-01

UAE Creates A Cyber Security Company With Israeli Partners

The collaboration will provide Defensive Cyber Solutions which is aimed to increase the security against cyber attacks on the UAE.

2021-01-05

How Nation States Use Their Cyber Power

The US and Chinese governments both use cyber attacks as instruments of policy and as technology improves, a cyber arms race grows imminent.

2021-01-05

The Cyber Security Top Ten Power List

To update Chairman Mao's belief that political power grows from the barrel of a gun, in the 21st century, it emerges via a computer keyboard.

2020-12-07

Russian Hackers Lured With Honeypots

NATO is using deception against hackers, who, believing their intrusions to be successful, are actually exposed to surveillance and analysis.

2020-11-25

Coming Soon: Regulation Of Social Media

If the 'informational chaos' of Social Media is a threat to democracy, then might its regulation by governments be a threat to free speech?

2020-11-23

Outsourced Cyber Spying

Spying As A Service: Outsourcing an espionage campaign against your competitors to a specialist hacking group is now a practical proposition.

2020-11-09

Cyber Warfare Is The New Frontier

The Future Of Conflict: In an accelerating cyber arms race, there is a lack of clear international rules governing the use of cyber weapons.

2020-10-27

Russia's Hackers Are Masters Of Cyber Warfare

The British and US indictments of the 'Sandworm' group of military hackers reveals the extensive reach and power of professional cyber soldiers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

ITrust

ITrust

French cybersecurity pure player since 2007. ITrust offers its Cyber expertise services and develops disruptive products in Cyber/Artificial Intelligence.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Neptune Cyber

Neptune Cyber

Neptune is a cyber security company that works exclusively in the marine sector. Our team combines experts in shipbuilding, maintenance and operations and cyber security testing and design.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.