INTELLIGENCE > > USA


« Back to News

2017-08-14

Who Are The Shadow Brokers?

The indications point to intelligence insiders who are either current or former US intelligence community contractors.

2017-08-02

CIA Malware Unveiled

Wikileaks' latest release of CIA secret exploits include previously unknown malware developed by major US defence contractor, Raytheon.

2017-07-27

Trump Tells US Cyber Command To Get More Aggressive

The Trump administration is pushing forward with its plan to make US Cyber Command increase the nation’s offensive and defensive cyber capabilities.

2017-07-27

NSA Has Done Little To Prevent The Next Edward Snowden

When he walked out of the NSA with some of its most secret files, the agency didn't have a list of people who had privileged access to its networks.

2017-07-20

Russia Suspected As Hackers Breach Power Plant Systems

Hackers working for a foreign government have breached at least a dozen US power plants, searching for vulnerabilities in the electrical grid.

2017-07-17

US Marines Embrace Cyber Warfare

In the Halls of Montezuma: Collecting enemy cellphones, gathering forensic intelligence, flying surveillance drones, electromagnetic disruption.

2017-07-17

WikiLeaks Reveal CIA Credentials Malware

Both WannaCry and Petya ransomware attack waves are thought to originate in stolen NSA exploits. Wikileaks reveals there are many more.

2017-07-10

Trump’s Joint Cybersecurity Unit With Russia – It’s Not Happening

Reverse Gear: Plans for a joint cyber unit brought immediate ridicule amid concerns it was a Russian ruse to collect secrets.

2017-07-05

FBI Investigating Kaspersky

FBI is gathering facts about how the Russia based cybersecurity company works and to "what extent the US operations ultimately report to Russia."

2017-07-04

Cyberwar: A New Front For US Military

Cyber warfare is a game changer in how to assess enemies, meet their challenges and enact policies that match the growth of the cyber domain.

2017-07-04

VR Systems Will Change US Navy Training

Virtual Reality and light detection technologies are about to change the way the US Navy prepares for war.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.