INTELLIGENCE > > USA


« Back to News

2018-07-09

Blockchain For US Border Security

DHS want to combine blockchain technology with US border sensors and cameras to protect the integrity of data collected by IoT devices.

2018-07-09

China Escalates Hacks On The US

Submarines, Satellites & More. China's nation state hackers have reorganized and retooled to become even more effective at digital espionage.

2018-07-03

Trump Backs Russia On Election Interference

President Trump contradicts the US intelligence establishment's conclusions about Russian interference in the 2016 Presidential elections.

2018-07-02

What War Games Tell Us About The Use Of Cyber Weapons

The US defence establishment have been gaming cyber warfare to find out if cyber weapons are equally as destructive as conventional weapons.

2018-06-25

US Accuses Russia Of Interfering With Undersea Cables

The US Government says the FSB are engaged in deep-sea espionage to intercept and tap underwater telecommunications cables.

2018-06-22

The Pentagon's AI Program To Find Hidden Nuclear Missiles

The US military is increasing spending on a secret research effort to use Artificial Intelligence to help anticipate the launch of a nuclear-capable missile.

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-13

America Can Learn About Russian Disinformation From Europe

The information warfare tactics used in Ukraine, Estonia and elsewhere in Europe are easily replicable in the next US midterm elections.

2018-06-11

A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the US and China draws closer as the US investigates whether Huawei broke US sanctions against Iran.

2018-05-21

Ex-Employee Suspected Of Leaking CIA Hacking Tools

A CIA operative who worked on computer code used to spy on foreign adversaries is suspected of giving top-secret information to WikiLeaks.

2018-05-18

NSA Spies Triple Text and Phone Collection

The US intelligence agency collected 534 million domestic phone records last year, even though its bulk interception power is limited by federal law.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

C2B2

C2B2

C2B2 are experts in middleware support and consultancy. We specialise in ensuring scalability, performance and security of large scale systems.

CommVault Systems

CommVault Systems

CommVault is focused on helping organisations protect, manage, find and use their data and information quickly, simply and cost effectively.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

MagiQ

MagiQ

MagiQ QPN is a market leading Quantum Cryptography solution that delivers advanced network security.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Omniscope

Omniscope

Omniscope is a a digital threat intelligence and investigations company specialising in open-source intelligence to protect you and your business.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.