INTELLIGENCE > International


« Back to News

2018-10-15

Cyberattack Revelations Appear To Undercut Russia's UN Efforts

Russia is planning to submit two UN resolutions later this month, one regulate states behaviour in cyberspace and one on a cybercrime convention.

2018-10-08

China Compromises Tech Companies With Malicious Microchips

Has the Chinese military really implanted malicious microchips in motherboards used by almost 30 US companies and intelligence agencies?

2018-10-05

US Offers Its Cyber Secrets To NATO

The US is shortly expected to announce that it will offer its cyber warfare capabilities on NATO's behalf as it acts to counter Russian aggression.

2018-10-05

Russia Stands Accused Of Global Hacking Campaign

Russia is running a hacking campaign to undermine democracies, targeting institutions from sporting bodies to the chemical weapons watchdog.

2018-10-02

The Image Of Julian Assange Grows Darker

The architect of WikiLeaks depicts himself as an heroic fighter for the cause of transparency, but that image is getting harder to take at face value.

2018-10-01

NATO Can’t Agree On What A Cyber Attack Is

NATO member states have not reached consensus on how to actually count and categorise cyber incidents across the alliance.

2018-09-21

Spyware Proliferates To 45 Countries

Pegasus spyware, which targets iPhones and Android devices, has infiltrated numerous countries where its is used to abuse human rights.

2018-09-13

Will Russian Hackers Affect this Year's US Election?

Once again, hackers on the outside of the American political system were probing for a way in to exert a malign influence on elections.

2018-09-13

Britain Plots Cyber Revenge On Russia For Novichok Poisonings

Britain and its allies promise revenge on Vladimir Putin’s regime for the Novichok attack believed to be carried out by Russian secret agents.

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.