INTELLIGENCE > > USA


« Back to News

2015-12-14

Can Surveillance Drones Prevent the Next Kunduz?

Basic communications failures in contributed to a tragedy in which more than 30 people died at Kunduz, in Afghanistan,

2015-12-09

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns.

2015-12-06

OPM Hack Was Criminal - Not China Government Sponsored

Surprise: China's official investigation into the massive breach affecting 22 million US federal workers finds it was a criminal enterprise.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-12-04

CIA Say Edward Snowden 'taught ISIS to avoid detection'

Former CIA deputy director claims Snowden is directly implicated in the rapid expansion of ISIS in the months after his first leaks in 2013.

2015-11-25

Did China Authorize Major High Level Hack on US & It’s Allies?

High Alert: Google announces discovery of a phishing scam based in China, targeting email passwords of senior government officials.

2015-11-25

US Intelligence Faces A Diversity of Challenges

From nation-states to individuals acting on behalf of terrorist groups, the US intelligence community has big challenges preventing attacks.

2015-11-23

Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia

US lawmakers want to project more power in the newest military domain.

2015-11-11

Energy Under Hacktivist Threat

The FBI say that politically motivated Hackers are the second biggest threat to the U.S Energy sector, after it's own employees.

2015-11-11

Who Is In Charge if a Massive Cyber Attack Strikes the U.S?

Large scale cyber attacks on infrastructure may be unlikely, but if it happens, the chain of command is far from clear.

2015-11-13

EU votes Snowden Human Rights Asylum

MEPs last week voted Edward Snowden should be granted asylum in Europe on the grounds that he is a “defender of human rights.”

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.