INTELLIGENCE > > USA


« Back to News

2018-07-09

Blockchain For US Border Security

DHS want to combine blockchain technology with US border sensors and cameras to protect the integrity of data collected by IoT devices.

2018-07-09

China Escalates Hacks On The US

Submarines, Satellites & More. China's nation state hackers have reorganized and retooled to become even more effective at digital espionage.

2018-07-03

Trump Backs Russia On Election Interference

President Trump contradicts the US intelligence establishment's conclusions about Russian interference in the 2016 Presidential elections.

2018-07-02

What War Games Tell Us About The Use Of Cyber Weapons

The US defence establishment have been gaming cyber warfare to find out if cyber weapons are equally as destructive as conventional weapons.

2018-06-25

US Accuses Russia Of Interfering With Undersea Cables

The US Government says the FSB are engaged in deep-sea espionage to intercept and tap underwater telecommunications cables.

2018-06-22

The Pentagon's AI Program To Find Hidden Nuclear Missiles

The US military is increasing spending on a secret research effort to use Artificial Intelligence to help anticipate the launch of a nuclear-capable missile.

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-13

America Can Learn About Russian Disinformation From Europe

The information warfare tactics used in Ukraine, Estonia and elsewhere in Europe are easily replicable in the next US midterm elections.

2018-06-11

A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the US and China draws closer as the US investigates whether Huawei broke US sanctions against Iran.

2018-05-21

Ex-Employee Suspected Of Leaking CIA Hacking Tools

A CIA operative who worked on computer code used to spy on foreign adversaries is suspected of giving top-secret information to WikiLeaks.

2018-05-18

NSA Spies Triple Text and Phone Collection

The US intelligence agency collected 534 million domestic phone records last year, even though its bulk interception power is limited by federal law.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.