INTELLIGENCE > Hot Spots > Russia


« Back to News

2017-02-27

Could Britain Fight A Cyber War with Russia?

Can the UK and its NATO allies compete on the cyber battlefield as much as they do in the conventional spheres of air, land & sea warfare?

2017-02-10

Fallout In Russia : One Suspicious Death & Three Cyber Spies Arrested

There is a purge of the Russian espionage establishment in progress and it has something to do with the election of President Trump.

2017-02-07

Russia’s Attack On Web Freedom

Safe in Moscow, Edward Snowden has said very little about the Russian security apparatus, which is more intrusive than that in Europe & the USA.

2017-02-01

Kaspersky Lab Employee Arrested On Treason Charges

A leading cybercrime investigator at top security firm Kaspersky Lab has been arrested in Russia where he could face charges for high treason.

2017-01-20

Russia, Trump & Flawed Intelligence

US intelligence agencies have released a declassified version of a report on the part they believe Russia played in the US presidential election.

2017-01-19

One Million Say Pardon Snowden & Russia Says He Can Stay Two More Years

Obama's Final Acts: No pardon for Edward Snowden who can safely remain in Russia, while Chelsea Manning is released from jail early.

2017-01-11

Russia Waging Cyberwar On Ukraine

Silent War: The Ukrainian President says Russian security services are waging a cyberwar against his country.

2017-01-04

Russian Military Was Behind Hacking Clinton Campaign

Crowdstrike say they have evidence to link the Clinton campaign hacks with malware used by the Russian military intelligence team, Fancy Bear.

2016-12-30

US & Russia Relations: It’s A New Cold War

Retaliation: US expels Russian diplomats and threatens other undisclosed measure in response to interference in the Presidential election.

2016-12-09

China's Great Wall Into Russian Cybersecurity

The Kremlin has joined forces with Chinese authorities to bring the internet and its users under greater state control.

2016-12-12

Russia Has Foiled Cyberattacks By A Foreign Spy Agency

A "large-scale" cyberattack by foreign intelligence services meant to destabilise the country’s financial system has been thwarted.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.