INTELLIGENCE > International


« Back to News

2018-12-11

British Telecom Is Stripping Huawei Out Of Its Network

BT is to strip all Huawei equipment from its core 4G network and prevent the Chinese equipment vendor from bidding for core 5G network contracts.

2018-12-10

Russian Cyber Operations: State-led Organised Crime

Russia is emulating approaches used by cyber-criminals as it blurs the line between state and non-state activities in cyberspace.

2018-11-29

Cyber Attacks On Australia Reveal A Pattern

Skip R&D, go straight for the IP: China is breaking an agreement with Australia not to steal each other's commercial secrets.

2018-11-27

Russian Hackers Have New Weapons

Call them by their names: Fancy Bear, Cozy Bear, APT28 and Sofacy. They are all launching fresh attacks and one is on a mini-espionage campaign.

2018-11-27

Russian Cyber Strategy And Tactics

Russia views cyber very differently to its western counterparts, from how they define cyberwarfare to how they employ cyber capabilities.

2018-11-23

Cyber Warfare Needs Rules Of Engagement

Cyber space is the new battle space and eminent intelligence leaders are now calling for international terms of engagement in cyberwar.

2018-11-23

Russian Cyber Security Firm Kaspersky Moves Away From Moscow

Kaspersky Lab is moving key parts of its business out of Moscow to address risks arising from its exposure to the Russian intelligence services.

2018-11-12

Edward Snowden Issues Surveillance Warning To Israelis

Speaking from Moscow, Edward Snowden has urged an Israeli audience to be on guard against heavy-handed government & private surveillance.

2018-11-09

USA & China Named As Top Cyber-Attack Sources

Of 27 million attack sources analysed by NSFOCUS in H1 2018, attacks emanating from China, the USA & Russia were predominant.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Petri IT Knowledgebase

Petri IT Knowledgebase

The Petri IT Knowledgebase is one of the world’s leading content and community resources for IT professionals and system administrators.

Borwell

Borwell

Borwell delivers secure software and IT solutions, including cyber security, to UK Government departments as well as UK corporations and many SMEs.

Alipay

Alipay

Alipay.com is a third-party online payment platform and a leader in online payments with 400 million users.

PartnerRe

PartnerRe

PartnerRe Ltd. provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

Cyan AG

Cyan AG

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

#GDPR2 Conference

#GDPR2 Conference

#GDPR2 : Free Access. The Virtual European Data Protection Conference 28 May 2020. The Economic Forum for Best Practices in Data Protection in the Heart of Europe.