INTELLIGENCE > > USA


« Back to News

2016-08-30

High Resolution Cameras to Iraq

Iraq is to acquire the ScanEagle drone surveillance system to help suppress Islamic State.

2016-09-13

Snowden: NSA Hacking Tools Leak Is ‘a warning’

From safety in Moscow and with a new film coming out, Edward Snowden opines on the NSA Equation Group hack.

2016-09-12

Leak Spotlights NSA's Conflicting Missions

As well as spying overseas, the NSA has a lesser-known but growing role of helping to protect the US government's sensitive data.

2016-08-30

NSA Hackers Demand One Million Bitcoin

Shadowbrokers hold NSA to ransom and want to be paid in everyone’s favorite terror financing and money laundering currency - Bitcoin.

2016-08-30

Shadowbrokers Steal NSA Hacking Tools

A mystery hacking group says it has stolen the NSA's elite Equation Group's secret toolbox and is selling it to the highest bidder. Who are they?

2016-09-02

CIA Sees Intel Data Flood As Both A Benefit And A Danger

Deputy CIA Director Sean Roche reflects on the changes in the nature of intelligence gathering & analysis since the end of the Cold War.

2016-09-01

Anatomy Of Cyber Jihad

Islamic State already has the motive, means, and opportunity to acquire the personnel & code necessary to launch devastating cyber attacks.

2016-08-24

Donald Trump Doesn’t Understand Cyberwar

Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas. Oh dear.

2016-07-27

US Defense Intelligence Agency Is Researching Employee Social Media Histories

The Pentagon is researching a "social media checks" pilot scheme that would analyze public posts to help determine an employee's suitability.

2016-07-11

Hillary Clinton’s Email Problems Just Get Worse

The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. What next?

2016-07-06

Is Edward Snowden Really A Russian Agent?

To anybody acquainted with how Russia’s powerful intelligence services operate, the idea that Snowden is their collaborator is hardly controversial

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.