US National Security Agency’s Cyber Offensive

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and cyber defense missions will collaborate. It is thought the NSA’s new arm represents a more aggressive stance by the NSA to engage more in cyber-offense in the fight against foreign adversaries 

NSA Director and Cyber Command Chief General, Paul Nakasone (pictured)  reportedly believes there is a lot of room for improvement for cybersecurity in the struggle with malicious nation-state hackers. 

The new directorate is intended to once again make security a priority by combining it with the NSA’s foreign intelligence projects and increasing its focus on both national security networks and the defense industrial base.  According to the Wall Street Journal, the move forms part of a wider effort to more closely align the agency’s offensive and defensive operations.

Much like the UK’s GCHQ cybersecurity arm, the National Cyber Security Center (NCSC), the NSA’s cyber-security directorate will aim to protect the US from foreign adversaries by sharing more information with other federal agencies and the private sector.

The incoming directorate which is expected to be in full effect by October 1st will be led by Anne Neuberger, leader of NSA’s Russia Small group which deals with Russian cyber threats.  

The primary goal for Neuberger is to actively use signals intelligence gleaned from expanded operations against adversaries. This will improve communication between the NSA and essential corporations within the United States government, such as the Department of Homeland Security, Federal Bureau of Investigation, and US Cyber Command. 

Anyone could be susceptible to cyber-attack and have valuable information specifically made for them leaked to an adversary. The internet holds all kinds of information ranging from the military realm all the way to banking. If someone gets their hands on information stemming from one of these areas mentioned above, many lives could be ruined. 

IHLS:          Wall Street Journal

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

 

 

 

« UK Power Outage - The Cyber Effect?
Bank Creates Its Own AI To Identify & Disintegrate Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.