US National Security Agency’s Cyber Offensive

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and cyber defense missions will collaborate. It is thought the NSA’s new arm represents a more aggressive stance by the NSA to engage more in cyber-offense in the fight against foreign adversaries 

NSA Director and Cyber Command Chief General, Paul Nakasone (pictured)  reportedly believes there is a lot of room for improvement for cybersecurity in the struggle with malicious nation-state hackers. 

The new directorate is intended to once again make security a priority by combining it with the NSA’s foreign intelligence projects and increasing its focus on both national security networks and the defense industrial base.  According to the Wall Street Journal, the move forms part of a wider effort to more closely align the agency’s offensive and defensive operations.

Much like the UK’s GCHQ cybersecurity arm, the National Cyber Security Center (NCSC), the NSA’s cyber-security directorate will aim to protect the US from foreign adversaries by sharing more information with other federal agencies and the private sector.

The incoming directorate which is expected to be in full effect by October 1st will be led by Anne Neuberger, leader of NSA’s Russia Small group which deals with Russian cyber threats.  

The primary goal for Neuberger is to actively use signals intelligence gleaned from expanded operations against adversaries. This will improve communication between the NSA and essential corporations within the United States government, such as the Department of Homeland Security, Federal Bureau of Investigation, and US Cyber Command. 

Anyone could be susceptible to cyber-attack and have valuable information specifically made for them leaked to an adversary. The internet holds all kinds of information ranging from the military realm all the way to banking. If someone gets their hands on information stemming from one of these areas mentioned above, many lives could be ruined. 

IHLS:          Wall Street Journal

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

 

 

 

« UK Power Outage - The Cyber Effect?
Bank Creates Its Own AI To Identify & Disintegrate Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

National Crime Agency (NCA)

National Crime Agency (NCA)

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

Bastion Technologies

Bastion Technologies

All your cyber defense. One platform. Keep your business assets and employees safe under one roof. Manage your cyber defense quickly, easily & efficiently.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.