INTELLIGENCE > > USA


« Back to News

2023-07-31

Software Faults Ground F-35 Warplanes

The US Defense Department will stop accepting some newly built F-35 multirole jets as delays in upgrading the aircraft continue.

2023-07-03

The CIA Has A Social Media Campaign Just For Russians

The campaign includes a new CIA channel on Telegram - a widely used social media network that offers a source of unfiltered news in Russia.

2023-06-19

US Government Agencies Attacked By Russian Criminals

Update: Clop Ransom Campaign Spreads Across US: Johns Hopkins & Georgia universities, plus federal agencies hit by MOVEit vulnerability.

2023-05-01

‘Tyrannical IT’ Is A Critical Threat

Misinformation & Disinformation: Authoritarian countries increasingly rely on digital tools to suppress dissent both inside & beyond their borders.

2023-04-19

TikTok Will Comply With US Law

Under intense pressure, the parent company of TikTok, ByteDance, says that it will 'continue to protect' US user data from access by China.

2023-03-06

New US National Cyber Security Strategy

The US economy can no longer rely on the sort of cyber security measures which have failed to prevent huge economic losses caused by ransomware.

2022-11-01

Cyber Security Threats For The US Midterm Elections

Election officials have been alerted to protect their voting systems and be vigilant about political violence in a "very complex threat environment."

2022-10-28

Iranian Hackers Target US Midterm Elections

An Iranian threat group is preparing to interfere in the forthcoming US elections, targeting officials & companies involved with the voting process.

2022-10-12

US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department missions.

2022-09-15

The NSA Hacked Huawei Long Ago

The NSA penetrated Huawei's network technology ten years ago and can likely take steps to restrict & prevent any damaging or malicious activity.

2022-03-22

US Moves Cyber Defences To High Alert

Americans should ‘lock their digital doors’ to prepare for a Russian cyber attack as federal agencies and busineses are urged to remain vigilant.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

IONIX

IONIX

IONIX is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply chain.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.