INTELLIGENCE > > International


« Back to News

2016-02-08

Social Media Helped Create The Arab Spring, But Could Not Save It

Empowered by access to social media sites massive protests toppled Arab leaders, but it was as not a news path to democracy, merely a tool.

2016-02-03

China & Indonesia Engage In Joint Cyber War Simulations

Indonesia and China's cooperation suggests that weaker nations cannot provide national cyber security on their own.

2016-02-03

Cyber and Reality Domains Converge As The US Targets ISIS Hackers

The threat posed by ISIS is bringing new meaning to convergence as the US military starts using air strikes against hacking groups.

2016-02-01

Egyptian Uprising - a 'social media revolution'?

The 'Arab Spring' pro-democracy uprisings and their outcomes varied wildly, yet they had one defining characteristic in common: social media.

2016-01-20

Anonymous Want Revenge For Saudi Executions

Hackers have targeted Saudi Arabia's Ministry of Defence website with a sustained DDoS attack.

2016-01-18

ISIS Has a New Secure Messaging App

An encrypted Android app for exchanging secure messages, joining another app that distributes propaganda and recruiting material.

2016-01-14

Islamic State Launches A Cyber War Magazine

Islamic State has launched a magazine, 'Kybernetiq' to guide jihadists on how to take part in 'cyber war' including encryption & messaging.

2016-01-06

ISIS Secret Cyber Terrorism Forum Exposed

Discovered using the Telegram messaging app the hidden forum reflects ISIS hackers' growing desire to wage war online.

2016-01-04

Apple Opens Fire In Encryption Battle

On one side, Silicon Valley, arguing that weakening encryption puts privacy at risk. On the other, security services, police and governments.

2016-01-04

NSA Helped UK Spies Find Juniper's Security Holes

GCHQ acquired the capability to covertly exploit security vulnerabilities in firewalls made by Juniper Networks, with the NSA's cooperation.

2015-12-23

Could IS Create A Cyber War?

Critical industries need to significantly ramp up their cyber security or risk having Islamic State hackers attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.