The United States will continue to suffer increasingly damaging cyber attacks against both government and private sector networks as long as there is no significant response, according to a recent US intelligence community assessment. Show More Summary
The Asia Pacific is the most dynamic digital landscape in the world, home to the fastest adopters of new technologies and the largest concentration of mobile and social media users. An escalation in online activism, changing cyber dynamics,...Show More Summary
Secretary of Defense Ashton Carter emphasized the central role of electronic intelligence in future US strategy by appointing veteran master cyber-strategist Eric Rosenbach to be his chief of staff, he said in a statement on Monday.
Fresh research has cast further doubt on the ability of virtual private networks (VPNs) to protect users' privacy from intelligence agencies and criminal hackers. VPNs are secure lines of communication that set up a private network between devices across public networks. Show More Summary
According to NSA Chief and head of US Cyber Command Admiral Mike Rogers, US National Security Agency has a high degree of certainty that the intelligence community will be able to find out who are the perpetrators of the massive hack against the Office of Personnel Management.
Are you "threat intelligent"? Is your government "threat intelligent"? If you are an American, especially an American civil servant, you might conclude from the recent "massive" cyber attack on the federal agency responsible for collecting...Show More Summary
It seems we can rarely have a definitive win when it comes to certain things, and the surveillance state is one of those things. We beat the Cyber Intelligence Sharing and Protection Act last year, but this year it's back—without the "Protection"—as the Cybersecurity Information Sharing Act (CISA) now. Show More Summary
Cyber attacks are becoming increasingly more sophistica […]
Carmen Medina is an internationally known visionary and analytic thinker who served 32 years with the Central Intelligence Agency. During her time there, she served as Deputy Director, Intelligence and Director, Center for the Study of Intelligence (the CIA's internal think tank). Show More Summary
FireEye Threat Intelligence and Microsoft Threat Intell […]
They said an Iran deal would supercharge Tehran’s hacking brigade. But when they showed their data to U.S. intelligence analysts, they were told to get lost.
The recently signed cyber security pact between Russia and China is a cause for concern, former Chairman of the US House Intelligence Committee Mike Rogers told Sputnik on Tuesday.
The screenshot above is courtesy of Norse ? a cyber intelligence company that uses their global sensor network to track cyber threats around the world ? in real time (online here). Warning ? this global view can be a tad mesmerizing if you haven't seen it. There's no audio, but it's [...]
Cybereason is a cyber security company that was founded by ex-members of Israel's crack intelligence agency's cybersecurity unit 8200. 8200 is perhaps the biggest creator of security startups - ex unit members are behind an increasingly large number of successful security companies. Borne from their work at 8200 handling some [...]
This week on 'NCIS', Special Agent Ned Dorneget from NCIS cyber operations helps the team when a Navy ensign who worked in the Office of Naval Intelligence is murdered. Also, the team discovers that Jake and Gibbs have become good friends.
By Mark Jaycox | (Electronic Frontier Foundation) | – The House passed two cybersecurity “information sharing” bills today: the House Permanent Select Committee on Intelligence’s Protecting Cyber Networks Act, and the House…
The New York Times reported yesterday that a drone strike mean't to kill four Al Qaeda terrorists also killed two hostages that no one knew were there. This tragedy also revealed that drone operators rely upon signatures to form a "guesstimate" of the target.In Pakistan, unlike elsewhere in the world, the White House permits the C.I.A. Show More Summary
Raytheon is betting it can leverage the cybersecurity skills it honed for the U.S. military and intelligence agencies to sell to banks and retailers, investing almost $1.7 billion to establish a stand-alone cyber business.
An Oregon software programmer is calling on President Barrack Obama to arrest him for possibly violating an executive order which the 27-year-old believes prohibits citizens from providing cyber currency to intelligence leaker Edward Snowden.
Mataparda (CC BY 2.0) The Cyber Intelligence Sharing and Protection Act failed after Edward Snowden’s revelations of mass government spying. But today it’s back, largely unchanged, as the Cybersecurity Information Sharing Act—and President...Show More Summary