INTELLIGENCE > > International


« Back to News

2020-06-16

Britain Is Wide Open To Cyber Spying

Espionage against the UK is both wide reaching and significant and the Centre for Protection of National Infrastructure is one part of the response.

2020-05-13

Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used servers located in the US to deliver an attack on Israel's water and sewage infrastructure.

2020-05-11

New Dark Web Search Engine Can Strengthen Business Security

Beacon: Organisations interested in tracking their intellectual property & corporate secrets turning up on the Dark Web can use a new search tool.

2020-03-06

The US & Britain Edge Closer To An Agreement On Huawei

Britain has conceded to US pressure and is about to agree more strict limitations on Huawei’s presence in its 5G mobile telecom infrastructure.

2020-03-18

An Escalating Cyber-Espionage Campaign In The Middle East

Governmental organisations in Turkey, Jordan and Iraq are being targeted in a growing campaign to gather intelligence. Who would do that?

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-02-24

Hamas Hackers Use New Malware

Hamas, the Islamist political group that runs Gaza, are using new high-tech malware in campaigns against the local Palestinian Authority.

2020-02-25

Russia Denies That It Attacked Georgia

Georgia says that Russian military intelligence has launched a massive cyber-attack on their government and business organisations.

2020-02-18

Top Australian Spy Condemns Britain's Huawei Decision

The outgoing Head of the Australian Signals Directorate spy agency says that Britain is mistaken to think it can trust Huawei's 5G network.

2020-02-10

The Geopolitics Of Cybersecurity

Reading List: The technological transformation emerging from cyberspace is like nothing else before. Dr. Jayshree Pandya looks at the issues.

2020-02-06

Leaked Report: The United Nations Was Hacked

Major Meltdown: Hackers invaded the UN’s computer network in Geneva and Vienna in a spying operation that has been kept secret.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).