INTELLIGENCE > > USA


« Back to News

2019-01-21

US Vs. China - A Different Kind of Cyberwar

China is engaged in its own form of cyberwarfare, but one that does not readily fit into the West’s long-standing perceptions of war and peace.

2019-01-18

Russia Supported Trump Election Campaign

US Senate says Russia engaged in a coordinated campaign to get Donald Trump elected and US technology companies were central to its strategy.

2018-12-31

The NSA Is Spying On You Now

A look at eight methods the NSA is using to spy on you right now, according to documents leaked by Edward Snowden.

2018-12-11

US Marines Turn To Artificial Intelligence To Better Deploy Troops

The US Marine Corps is experimenting with AI to improve the way it deploys its forces and spot potential weaknesses years in advance.

2018-11-14

Dozens of Spies Killed Thanks To Flawed CIA Comms System

A catastrophic chain of events led to 70% of the CIA’s spy network in Iran being potentially compromised at some point between 2009-13.

2018-11-15

Neither US, Russia Or China Will Sign Macron's Cyber Pact

Three of today's major cyber-powers have not signed an agreement on rules and principles proposed by French President Emmanuel Macron.

2018-11-12

How Did Iran Find CIA Spies? They Googled It!

A covert channel used for communicating with CIA sources was exposed and infiltrated by Iranian intelligence in 2009.

2018-11-02

The Pentagon Prepares A Cyber-Attack On Russia

The defense establishment has agreed a plan for a major cyber-attack that the US could unleash if Russia interferes with the 2018 midterm election.

2018-11-09

USA & China Named As Top Cyber-Attack Sources

Of 27 million attack sources analysed by NSFOCUS in H1 2018, attacks emanating from China, the USA & Russia were predominant.

2018-10-31

Russia And US Offer Competing Visions Of Cyber Normality

The United States is trying to get Russia, China, and others 'on the record' on how international law applies online.

Perimeter 81

Directory of Suppliers

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Tortuga Logic

Tortuga Logic

Tortuga Logic provides expertise, design tools, and technologies to facilitate the design of secure hardware.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

iTechArt Group

iTechArt Group

iTechArt is a top-tier custom software development company offering Cybersecurity Consulting, Application Security Testing, Risk Management and Compliance, and Infrastructure Security services.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.