INTELLIGENCE > > USA


« Back to News

2016-06-20

US Nuclear Weapons Controlled by 8in Floppy Disks

The US military’s nuclear arsenal is controlled by computers built in the 1970s that still use 8in floppy disks.

2016-06-17

Pentagon ‘Misleads’ Over Location of UK Intelligence Centre

The Pentagon used “inaccurate or misleading” information to justify its choice of RAF Croughton for an ultra-secure intelligence analysis centre.

2016-06-10

NSA Has ‘No Idea’ How Many American Citizens It’s Spying On

The NSA monitors the electronic communications of millions of people to find foreign threats. How many US citizens are caught up ?

2016-06-05

A New Front in Obama’s War on Whistleblowers

Fired Pentagon assistant inspector general John Crane is going public with allegations about senior officials actions against whistleblowers,

2016-06-04

Open Access To The Snowden Archive

Emulating the Panama Papers Archive, The Intercept Magazine are opening up access to the secret documents Edward Snowden took from the NSA.

2016-05-19

China Denounces Pentagon Cyberwarfare Report

China does not like a new new US Defense Department report that puts a spotlight on cyberwarfare.

2016-05-23

Unified Cyber Command To Help US React Faster

Defense leaders are contemplating elevating US CyberCom to a full-fledged unified command.

2016-05-09

US National Intelligence Director Says Snowden Hastened Encryption By 7 Years

James Clapper says Snowden has had an accelerator effect on commercially available encryption, making it much harder to track terrorists.

2016-05-06

US Spies Want A Laser Gun Bomb Detector

A hand-held, laser-based remote sensor to detect and identify chemical weapons, explosives, narcotics & biological agents from 100 feet away.

2016-05-04

US Cyber Bombs On ISIS Change The Nature Cyber War

US Cyber Command is going on the offensive with aggressive online operations to augment lethal conventional military force with cyber capabilities.

2016-05-03

US Army's $12bn Mobile Internet Is Vulnerable

Improvements are needed to user training techniques, procedures, hardware and software enhancement to harden against cyber-threats.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.