US National Security Agency’s Cyber Offensive

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and cyber defense missions will collaborate. It is thought the NSA’s new arm represents a more aggressive stance by the NSA to engage more in cyber-offense in the fight against foreign adversaries 

NSA Director and Cyber Command Chief General, Paul Nakasone (pictured)  reportedly believes there is a lot of room for improvement for cybersecurity in the struggle with malicious nation-state hackers. 

The new directorate is intended to once again make security a priority by combining it with the NSA’s foreign intelligence projects and increasing its focus on both national security networks and the defense industrial base.  According to the Wall Street Journal, the move forms part of a wider effort to more closely align the agency’s offensive and defensive operations.

Much like the UK’s GCHQ cybersecurity arm, the National Cyber Security Center (NCSC), the NSA’s cyber-security directorate will aim to protect the US from foreign adversaries by sharing more information with other federal agencies and the private sector.

The incoming directorate which is expected to be in full effect by October 1st will be led by Anne Neuberger, leader of NSA’s Russia Small group which deals with Russian cyber threats.  

The primary goal for Neuberger is to actively use signals intelligence gleaned from expanded operations against adversaries. This will improve communication between the NSA and essential corporations within the United States government, such as the Department of Homeland Security, Federal Bureau of Investigation, and US Cyber Command. 

Anyone could be susceptible to cyber-attack and have valuable information specifically made for them leaked to an adversary. The internet holds all kinds of information ranging from the military realm all the way to banking. If someone gets their hands on information stemming from one of these areas mentioned above, many lives could be ruined. 

IHLS:          Wall Street Journal

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

 

 

 

« UK Power Outage - The Cyber Effect?
Bank Creates Its Own AI To Identify & Disintegrate Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

HardTarget

HardTarget

HardTarget is a cutting-edge cyber training company serving HWN (High-Net-Worth) Families and their trusted Advisors.