INTELLIGENCE > > USA


« Back to News

2020-07-16

Confirmed: US Cyber Attack On Russia In 2018

President Trump says the US conducted a covert cyber attack against Russia's Internet Research Agency during the 2018 midterm elections.

2020-07-07

Who Actually Did Leak CIA Cyber Weapons Data?

The largest known data theft in CIA history occurred because an employee took advantage of weak security. And It wasn't Edward Snowden.

2020-06-15

Nuclear Missile Contractor Hacked

Hackers have stolen confidential documents from a US firm which provides critical support for the country's Minuteman III nuclear deterrent.

2020-04-07

The US Has A New 5G Security Strategy

The US intends to protect its fifth-generation wireless infrastructure at home and overseas and President Trump has laid out his plan to do so.

2020-04-03

Wikileaks Alerted Hackers To CyberCom

US Cyber Command accuses Wikileaks of revealing operational security changes that could assist malicious nation-state hacking groups.

2020-02-11

US Government Cyber Security Still Needs Work

The US State Department has consistently failed to secure its IT systems from cyber attacks, reflecting a general mismanagement of resources.

2020-02-10

Spies Really Like Artificial Intelligence

AI is helping US spy agencies reach analytical conclusions with instantaneous machine translation, speech recognition and data collection.

2020-01-27

US Cyber Command Is A Tool Of Foreign Policy

The Trump administration is being quite open about its use of cyber weapons to influence, deter and punish other nation states.

2020-01-24

US Cyber Command Hacked ISIS

US Cyber Command operations to disrupt ISIS online networks since 2106 were largely successful but there were significant shortcomings.

2020-01-20

AI Satellite Image Analysis Will Be Regulated

Satellite imaging and intelligence gathering programs are being taken to an entirely new level by the introduction of AI-driven technology.

2020-01-09

Iranian Hackers Attack The US, Not Very Badly

US Homeland Security has issued an advisory notice warning public & private sector organisations of increased cyber attacks from Iran.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Noerr

Noerr

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We provide solutions to complex and sophisticated legal matters including cyber risks.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.