INTELLIGENCE > > USA


« Back to News

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-14

US Military Fighting ISIS In Cyberspace

No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding fighters on the ground.

2017-09-08

US Navy’s State-of-The-Art AI Drone

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly.

2017-08-30

Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than previously known

2017-08-21

N. Korea Will Unleash Cyber Attacks On The US

US officials are increasingly concerned the rogue regime will respond to international pressure by lashing out with a weapon it has already mastered.

2017-08-16

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

Is it possible for the US to simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

2017-08-14

Who Are The Shadow Brokers?

The indications point to intelligence insiders who are either current or former US intelligence community contractors.

2017-08-02

CIA Malware Unveiled

Wikileaks' latest release of CIA secret exploits include previously unknown malware developed by major US defence contractor, Raytheon.

2017-07-27

Trump Tells US Cyber Command To Get More Aggressive

The Trump administration is pushing forward with its plan to make US Cyber Command increase the nation’s offensive and defensive cyber capabilities.

2017-07-27

NSA Has Done Little To Prevent The Next Edward Snowden

When he walked out of the NSA with some of its most secret files, the agency didn't have a list of people who had privileged access to its networks.

2017-07-20

Russia Suspected As Hackers Breach Power Plant Systems

Hackers working for a foreign government have breached at least a dozen US power plants, searching for vulnerabilities in the electrical grid.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.