INTELLIGENCE > > International


« Back to News

2020-05-13

Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used servers located in the US to deliver an attack on Israel's water and sewage infrastructure.

2020-05-11

New Dark Web Search Engine Can Strengthen Business Security

Beacon: Organisations interested in tracking their intellectual property & corporate secrets turning up on the Dark Web can use a new search tool.

2020-03-06

The US & Britain Edge Closer To An Agreement On Huawei

Britain has conceded to US pressure and is about to agree more strict limitations on Huawei’s presence in its 5G mobile telecom infrastructure.

2020-03-18

An Escalating Cyber-Espionage Campaign In The Middle East

Governmental organisations in Turkey, Jordan and Iraq are being targeted in a growing campaign to gather intelligence. Who would do that?

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-02-24

Hamas Hackers Use New Malware

Hamas, the Islamist political group that runs Gaza, are using new high-tech malware in campaigns against the local Palestinian Authority.

2020-02-25

Russia Denies That It Attacked Georgia

Georgia says that Russian military intelligence has launched a massive cyber-attack on their government and business organisations.

2020-02-18

Top Australian Spy Condemns Britain's Huawei Decision

The outgoing Head of the Australian Signals Directorate spy agency says that Britain is mistaken to think it can trust Huawei's 5G network.

2020-02-10

The Geopolitics Of Cybersecurity

Reading List: The technological transformation emerging from cyberspace is like nothing else before. Dr. Jayshree Pandya looks at the issues.

2020-02-06

Leaked Report: The United Nations Was Hacked

Major Meltdown: Hackers invaded the UN’s computer network in Geneva and Vienna in a spying operation that has been kept secret.

2020-01-20

Can A 5G Network Really Be Secure?

Governments in Australia, Britain and Germany are in difficulty over the choice of technology suppliers to establish their national 5G networks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Swascan

Swascan

Swascan is the first all-in-one, GDPR Compliant, Cloud Security Suite Platform. GDPR Assessment, Web Application Scan, Network Scan, Code Review.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.