INTELLIGENCE > > USA


« Back to News

2020-12-24

Major Cyber Attack On US Government Agencies Blamed On Russia

Secretary of State Pompeo has blamed Russia for what is being described as the worst-ever cyber espionage attack on the US government.

2020-12-23

Plans To Divide US Cyber Command And The NSA

Outgoing Pentagon officials are seeking fast-track approval to divide the leadership of the National Security Agency and US Cyber Command.

2020-11-02

Cyber Spying Laws Are Changing

Important legal rulings in Britain and the USA show how important it is for business to keep up with and understand national IT & data security laws.

2020-10-23

Voter Data Being Used To Disrupt US Election

US intelligence agencies say that Iran and Russia are using voter data “to sow chaos and confusion" ahead of the presidential election.

2020-09-29

Chinese Hackers Spying On US Government Agencies

Chinese hackers are exploiting known software flaws in commercial technologies and open-source tools to target US government and businesses.

2020-09-28

Putin Says US & Russia Should Have A 'No Hacking' Agreement

President Vladimir Putin is calling for a reset agreement between the two countries to prevent incidents in cyberspace.

2020-09-21

Foreign Influence In The American Election Of 2020 Is Declining

A long-serving CIA official and distinguished expert on cybersecurity says that there will be less interference in the 2020 election than 2016.

2020-08-31

US - China Conflict Over Social Media

There is now more tension between the US and China as the US government focuses on the Chinese online services industry.

2020-07-27

US National Cyber Defense Policy

The US Government will spend $740 billion on its cyber defenses next year, co-ordinating public and private response to threats for the first time.

2020-07-16

Confirmed: US Cyber Attack On Russia In 2018

President Trump says the US conducted a covert cyber attack against Russia's Internet Research Agency during the 2018 midterm elections.

2020-07-07

Who Actually Did Leak CIA Cyber Weapons Data?

The largest known data theft in CIA history occurred because an employee took advantage of weak security. And It wasn't Edward Snowden.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.