INTELLIGENCE > > International


« Back to News

2016-05-25

Mobile Spying – What’s Possible, Ethical Or Useful?

Many widely used mobile apps have a legitimate feature - remote mobile monitoring. Is this any different from illegitimate spyware?

2016-05-12

IS Forms Mega Hacking Group

The super hacking unit is labeled United Cyber Caliphate (UCC).

2016-05-11

Tracking Islamic State Impeded By Encryption

Islamic State is the 'most sophisticated' user of the Internet and the available technologies to ensure end-to-end encryption.

2016-05-09

Search It Yourself: Panama Papers Database Goes Public

The body behind the Panama Papers revelations makes an enormous database of financial data public today.

2016-05-09

Future Intelligence Sharing In the Syrian War

Integrated Intelligence: Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system.

2016-05-04

Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Africa and counter-efforts are struggling.

2016-05-04

Fear This Man And His Hacking Empire

Hacking Team is among the few dozen private contractors feeding the world’s law enforcement & intelligence agencies with spyware.

2016-05-02

South Korea Is No.1 Top Source Of DDoS Attacks

South Korea accounts for a proportion of global DDoS responsibility more than the next three countries combined.

2016-05-02

Snowden Intervenes In The Encryption Debate

Speaking from safety in Moscow, Snowden argued that the security of the Internet is more important than the convenience of law enforcement.

2016-04-26

US Give Philippines Eyes On The South China Sea

The United States will give its oldest Asia-Pacific security ally $42 million worth of sensors, radar and communications equipment.

2016-04-27

On the Brink of Cyber War…

Moscow, Washington Meet Quietly in Geneva to renew efforts to prevent rushing into a cyber war “by mistake,”

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

InterVision

InterVision

InterVision is a leading Strategic Services Provider, assisting businesses in driving value and gaining a competitive edge by helping IT Leaders solve the most crucial challenges they face.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.