INTELLIGENCE > > USA


« Back to News

2017-05-31

Current Cybercrime Threats Originate In Espionage

Spy agencies like the US National Security Agency hoard weapons that, by their very nature, target civilian infrastructure.

2017-05-23

Trump Signs Cybersecurity Order

Three Components: Protecting federal networks, cybersecurity of critical infrastructure and promoting cyber-security workforce development.

2017-05-05

US vs. North Korea Cyberwar Underway

It seems highly likely that an innovative and highly secretive cyber war is underway with implications for critical infrastructure.

2017-05-03

Intelligence Agency Backs Start-Up Spy Apps

The US Defense Intelligence Agency has a new approach to acquisition and software development that looks a lot like Silicon Valley's.

2017-05-02

Technology Can Not Diminish Insider Threats By Itself

The key to reducing insider threats lies in understanding the individual’s mindset and having robust monitoring on that person's systems & data.

2017-05-02

Snowden Can Stay In Russia For As Long As He Likes

The former NSA contractor has been living in Russia since 2013, after leaking thousands of classified intelligence documents and fleeing the US.

2017-04-28

US Intelligence Agencies Fear Insiders As Much As Spies

Forget about spies. It's rogue insiders that cause heartburn at US intelligence agencies these days.

2017-04-21

The Next Big Conflict Will Turn On Artificial Intelligence

Whoever collects the most data on Day One just might win the next war before a even single shot is fired.

2017-04-18

Cyber War Calls For A New Look US Soldier

Passing basic training and a drugs test: The best cyber warriors don’t always make the best soldiers.

2017-04-18

WikiLeaks Has Published The CIA’s Secrets For Infecting Windows

Wikileaks' release of CIA secret hacking tools includes software to build customised malware to compromise computers running Windows.

2017-04-12

Mike Rogers Wants To Buy Cyber Weapons 'Off The Shelf'

The NSA & US Cyber Command chief is thinking of going to the private sector to buy the next generation of ready- made cyber weapons.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.