INTELLIGENCE > > USA


« Back to News

2019-03-25

US Army Wants To Convert Tanks Into Autonomous Weapons

The US Army plan to build AI - directed tanks is'“another significant step towards lethal autonomous weapons.”

2019-03-01

US Under Attack By Chinese & Iranian Hackers

Geopolitics pay out in cyberspace as attacks from Iran and China reflect disagreements between nation states on sanctions and trade.

2019-03-04

The US Military Has A Free Rein For Offensive Hacking

The Trump administration made it easier for the US military to conduct offensive cyber operations. But this new authority should be used carefully.

2019-02-26

DARPA To Test Infrastructure Resilience

Cyber-attacks pose a challenge for US infrastructure security and DARPA have set up a joint exercise to test resistance to multiple threats.

2019-02-04

US National Intelligence Cyber Threats Strategy 2019

The latest National Intelligence Strategy sets out the way the US Intelligence Community will deal with Cyber Threats for the next four years.

2019-01-31

US Intelligence Chief Warns Of ‘ever more diverse’ Threats

The US "faces an increasingly complex and uncertain world in which threats are becoming ever more diverse and interconnected."

2019-01-21

Shutdown Is Doing Lasting Damage To US National Security

Halting cybersecurity work makes it easier for hostile nation-states to steal Americans’ personal information and corporate intellectual property.

2019-01-21

US Vs. China - A Different Kind of Cyberwar

China is engaged in its own form of cyberwarfare, but one that does not readily fit into the West’s long-standing perceptions of war and peace.

2019-01-18

Russia Supported Trump Election Campaign

US Senate says Russia engaged in a coordinated campaign to get Donald Trump elected and US technology companies were central to its strategy.

2018-12-31

The NSA Is Spying On You Now

A look at eight methods the NSA is using to spy on you right now, according to documents leaked by Edward Snowden.

2018-12-11

US Marines Turn To Artificial Intelligence To Better Deploy Troops

The US Marine Corps is experimenting with AI to improve the way it deploys its forces and spot potential weaknesses years in advance.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

CSIRT.CZ

CSIRT.CZ

National Computer Security Incident Response Team of the Czech Republic.

Guardea

Guardea

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.