INTELLIGENCE > > International


« Back to News

2017-02-03

Stuxnet, Secrecy & The New Era of Cyber War

Should Cyber weapons be subject to international controls & protocols in the same way as nuclear and some other conventional weapons?

2017-01-23

Electoral Influence: 40yrs Of Kremlin Interference

Russian attempts to influence the US presidential election outcome should cause no surprise. It is traditional. Opinion By Prof. Christopher Andrew.

2017-01-23

The Swedish Kings of Cyberwar

Forget GCHQ. The Swedish National Radio Defence Intelligence Agency has some remarkable technical capabilities.

2017-01-16

German Police Will Squash Fake Online News

Pure Fiction: Combining exaggerated and unconnected incidents to create a picture of chaos and of foreigners promoting terrorism.

2017-01-13

ISIS Just Can’t Resist Social Media

Social media is a key tool used by Jihadis to recruit followers, spread their radical interpretations of Islam and to promote outrage.

2017-01-10

Surprise: Snowden Knows Some Russian Spies

Edward Snowden “has had and continues to have contact” with Russian intelligence services since arriving to safety in Moscow three years ago.

2016-12-27

We Are In A New Era Of Espionage

Hackers' interference in the US Presidential Election is one of the greatest examples of a successful espionage operation in history.

2016-12-21

NSA Eavesdrops On In-flight Mobile Calls

Thieving Magpie: The NSA and GCHQ have a joint surveillance program dedicated to intercepting targets in-flight by tracking their mobiles.

2016-12-20

Tackling Cybercrime: Time For The Regional Gulf Cooperation Council To Join Global Efforts

Gulf countries need to share information, intelligence & lessons learned in order to find the best ways to curb cybercrime. Opinion by Joyce Hakmeh

2016-12-16

MI6 Spies Infiltrate ISIS HQ

British spies are risking their lives daily in Islamic State heartlands to “take the fight to the enemy,” say MI6.

2016-12-12

Russia Has Foiled Cyberattacks By A Foreign Spy Agency

A "large-scale" cyberattack by foreign intelligence services meant to destabilise the country’s financial system has been thwarted.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.