INTELLIGENCE > > USA


« Back to News

2015-09-16

Five Months After the OPM Attack.

The 21.5 million victims of the largest known U.S government breach will just begin receiving their notifications at the end of September.

2015-09-16

Russia & China Use Hacked Databases to Find US Spies

Foreign intelligence agencies are reportedly crosschecking hacked databases & compromised information for evidence.

2015-09-16

Getting Hotter: China vs US Cyberwar

US-China relations are taking a nosedive over the OPM hack but China is a victim too.

2015-09-15

Pentagon Will Counterattack Cyber Strikes

XD3 - DARPA are working on Extreme DDoS Defense with a recovery time of just 10 seconds following an attack.

2015-09-17

Cyber Threat: First Data Theft - Next Data Manipulation

US intelligence chiefs warn the next phase of escalating online data theft will involve the manipulation of digital information.

2015-09-11

Firm That cleared Edward Snowden Will Pay NSA $30m Damages

Big Mistake: Private firm that vetted Edward Snowden for security clearance to work for the NSA will pay compensation.

2015-09-08

US Intelligence Keys in on the Russian ‘Troll Army’ Manipulating Social Media

False Open Sources: US Intelligence thinks that Russia is skilful at using social media to generate propaganda.

2015-09-09

Snowden Has No Plans to Leave Russia

His lawyer says it's all fine and dandy in Moscow, although Edward Snowden is not considering applying for Russian citizenship. Yet.

2015-09-08

US & China Are Escalating Their Cyber War

When competitors become adversaries judging the level of threat and response becomes complicated.

2015-09-02

Hack on United Airlines Makes CIA's Job More Difficult

Stolen medical and financial records, may now include US intelligence officials’ travel itineraries from the world’s second-largest airline.

2015-08-28

China Calls US a 'Cyber Bully' After False Accusation

Think Twice: Retaliation against China for the giant OPM Hack could be a big mistake.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.