INTELLIGENCE > > USA


« Back to News

2016-01-15

NSA Chief Says The Rules of War Do Apply to Cyberwar

The Pentagon keeps its rapidly expanding cyber arsenal almost entirely secret.Is there a way to publicly discuss the future of cyber operations?

2016-01-12

USA 2016: How Will Snowden Vote?

Edward Snowden is still a US citizen and eligible to vote in the presidential election, even from exile in Russia. Democrat or Republican?

2016-01-04

Islamic State Aims to Launch Cyberattacks on US

The Islamic State is seeking the ability to launch cyberattacks against US government and civilian targets.

2016-01-04

US Agencies Freak Out Over Juniper Backdoor

Juniper Networks has uncovered unauthorized code in its firewall operating system, allowing attackers to get in and decrypt VPN traffic.

2015-12-17

Mystery: US State Dept. Can't Find Missing Clinton Emails

The US Department of State has lost Hillary Clinton's emails and pleads the 5th Amendment. Maybe the FBI have got them?

2015-12-14

Can Surveillance Drones Prevent the Next Kunduz?

Basic communications failures in contributed to a tragedy in which more than 30 people died at Kunduz, in Afghanistan,

2015-12-09

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns.

2015-12-06

OPM Hack Was Criminal - Not China Government Sponsored

Surprise: China's official investigation into the massive breach affecting 22 million US federal workers finds it was a criminal enterprise.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-12-04

CIA Say Edward Snowden 'taught ISIS to avoid detection'

Former CIA deputy director claims Snowden is directly implicated in the rapid expansion of ISIS in the months after his first leaks in 2013.

2015-11-25

Did China Authorize Major High Level Hack on US & It’s Allies?

High Alert: Google announces discovery of a phishing scam based in China, targeting email passwords of senior government officials.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

PureCyber

PureCyber

PureCyber (previously Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

JpU

JpU

JpU develops a robust, purpose-built mobile network core to simplify the management of IoT networks and consolidate security for all connected devices.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Tesserent

Tesserent

Tesserent offers world-class managed security at your network perimeter, internal behavioural monitoring and end-point device protection.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

AGC Networks

AGC Networks

AGC Networks is a Global Solutions Integrator representing the world's best brands in Unified Communications, Data Center & Edge IT, Cyber Security and Digital Transformation & Applications.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.