INTELLIGENCE > > International


« Back to News

2016-11-09

NATO Cyberwar: Establishing Rules Of Engagement

Counter-measures are operations that would otherwise be unlawful but can be used if the purpose is to stop another state from violating the law.

2016-11-07

North vs. South: Cyber Warfare In Korea Is Escalating

N. Korean government entities spearheading propaganda efforts are operating task forces to post comments on Internet portals in S. Korea.

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

2016-11-09

Was North Korea Behind The IoT DDoS Attack?

Multiple big-name sites, including Twitter, Spotify and GitHub, experienced slowdowns in an attack against DNS services took shape.Was it N. Korea?

2016-10-31

ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-26

British Military Is Using Cyber Warfare Against Islamic State

The UK admits using cyber warfare techniques in the fight against Islamic State for control of the Iraqi city of Mosul.

2016-10-20

Women Suspected To Attempt Next Terror Attack

After a string of arrests of radicalised women, Europe is preparing for the next IS inspired terror attacks to be carried out by female assassins.

2016-10-17

NATO’s Cyber-Capabilities Are Only Defensive

NATO's ability to respond offensively to Cyber-attacks is hindered by its previous inaction and inherent difficulties surrounding Cyber defense.

2016-10-14

Cyber Threats To Israel’s Air Traffic Control

Cyber-attacks on Israeli infrastructure are constant and may now include air traffic control installations.

2016-10-12

AI Is Replacing Human Made Decisions In The US Military

A new survey of existing weapon systems finds that AI is increasingly used to replace humans, not just helping them.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Armexa

Armexa

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.