US National Security Agency’s Cyber Offensive

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and cyber defense missions will collaborate. It is thought the NSA’s new arm represents a more aggressive stance by the NSA to engage more in cyber-offense in the fight against foreign adversaries 

NSA Director and Cyber Command Chief General, Paul Nakasone (pictured)  reportedly believes there is a lot of room for improvement for cybersecurity in the struggle with malicious nation-state hackers. 

The new directorate is intended to once again make security a priority by combining it with the NSA’s foreign intelligence projects and increasing its focus on both national security networks and the defense industrial base.  According to the Wall Street Journal, the move forms part of a wider effort to more closely align the agency’s offensive and defensive operations.

Much like the UK’s GCHQ cybersecurity arm, the National Cyber Security Center (NCSC), the NSA’s cyber-security directorate will aim to protect the US from foreign adversaries by sharing more information with other federal agencies and the private sector.

The incoming directorate which is expected to be in full effect by October 1st will be led by Anne Neuberger, leader of NSA’s Russia Small group which deals with Russian cyber threats.  

The primary goal for Neuberger is to actively use signals intelligence gleaned from expanded operations against adversaries. This will improve communication between the NSA and essential corporations within the United States government, such as the Department of Homeland Security, Federal Bureau of Investigation, and US Cyber Command. 

Anyone could be susceptible to cyber-attack and have valuable information specifically made for them leaked to an adversary. The internet holds all kinds of information ranging from the military realm all the way to banking. If someone gets their hands on information stemming from one of these areas mentioned above, many lives could be ruined. 

IHLS:          Wall Street Journal

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

 

 

 

« UK Power Outage - The Cyber Effect?
Bank Creates Its Own AI To Identify & Disintegrate Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

European Digital Media Association (EDiMA)

European Digital Media Association (EDiMA)

EDiMA, is the European trade association representing online platforms. It is an alliance of new media and Internet companies.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.