INTELLIGENCE > > International


« Back to News

2021-02-25

GCHQ Jammed ISIS Drones & Servers

A secret cyber operation which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

2021-02-03

Enemy Action - The Distinctive Features Of Cyber Warfare

Operating behind false IP addresses, foreign servers and aliases, attackers can act with almost complete anonymity and relative impunity.

2021-01-15

Spies In Cyberspace

The United States government is one among many that need to radically improve their national security strategies against cyber espionage.

2021-01-01

UAE Creates A Cyber Security Company With Israeli Partners

The collaboration will provide Defensive Cyber Solutions which is aimed to increase the security against cyber attacks on the UAE.

2021-01-05

How Nation States Use Their Cyber Power

The US and Chinese governments both use cyber attacks as instruments of policy and as technology improves, a cyber arms race grows imminent.

2021-01-05

The Cyber Security Top Ten Power List

To update Chairman Mao's belief that political power grows from the barrel of a gun, in the 21st century, it emerges via a computer keyboard.

2020-12-07

Russian Hackers Lured With Honeypots

NATO is using deception against hackers, who, believing their intrusions to be successful, are actually exposed to surveillance and analysis.

2020-11-25

Coming Soon: Regulation Of Social Media

If the 'informational chaos' of Social Media is a threat to democracy, then might its regulation by governments be a threat to free speech?

2020-11-23

Outsourced Cyber Spying

Spying As A Service: Outsourcing an espionage campaign against your competitors to a specialist hacking group is now a practical proposition.

2020-11-09

Cyber Warfare Is The New Frontier

The Future Of Conflict: In an accelerating cyber arms race, there is a lack of clear international rules governing the use of cyber weapons.

2020-10-27

Russia's Hackers Are Masters Of Cyber Warfare

The British and US indictments of the 'Sandworm' group of military hackers reveals the extensive reach and power of professional cyber soldiers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.