Trend Results : Cyber Intelligence


Blog Post Results (1-20 of 422)

FILTER RESULTS

US intelligence community report: America's weak response to cyber attacks will encourage more breaches

The United States will continue to suffer increasingly damaging cyber attacks against both government and private sector networks as long as there is no significant response, according to a recent US intelligence community assessment. Show More Summary

Digital Asia links (China special!): WeChat, intelligence wars, Taylor Swift, Spartan models and more

The Asia Pacific is the most dynamic digital landscape in the world, home to the fastest adopters of new technologies and the largest concentration of mobile and social media users. An escalation in online activism, changing cyber dynamics,...Show More Summary

US Defense Secretary Names Ace Cyber Warrior as New Right Hand Man

Secretary of Defense Ashton Carter emphasized the central role of electronic intelligence in future US strategy by appointing veteran master cyber-strategist Eric Rosenbach to be his chief of staff, he said in a statement on Monday.

VPNs won’t protect you from state spooks and cyber crooks

Fresh research has cast further doubt on the ability of virtual private networks (VPNs) to protect users' privacy from intelligence agencies and criminal hackers. VPNs are secure lines of communication that set up a private network between devices across public networks. Show More Summary

NSA Confident in Ability to Attribute Massive Government Data Breach

According to NSA Chief and head of US Cyber Command Admiral Mike Rogers, US National Security Agency has a high degree of certainty that the intelligence community will be able to find out who are the perpetrators of the massive hack against the Office of Personnel Management.

'Threat Intelligence' is the Latest Buzz Word in Cyber Security

Are you "threat intelligent"? Is your government "threat intelligent"? If you are an American, especially an American civil servant, you might conclude from the recent "massive" cyber attack on the federal agency responsible for collecting...Show More Summary

Intelligence hawks try to capitalize on Chinese hack to pass another bad cybersecurity bill

It seems we can rarely have a definitive win when it comes to certain things, and the surveillance state is one of those things. We beat the Cyber Intelligence Sharing and Protection Act last year, but this year it's back—without the "Protection"—as the Cybersecurity Information Sharing Act (CISA) now. Show More Summary

Former Director, CIA's Center for the Study of Intelligence, on Improving Cyber Threat Analysis

Carmen Medina is an internationally known visionary and analytic thinker who served 32 years with the Central Intelligence Agency. During her time there, she served as Deputy Director, Intelligence and Director, Center for the Study of Intelligence (the CIA's internal think tank). Show More Summary

The Overhyping of Iran's Cyber Army

3 months agoNews : The Daily Beast

They said an Iran deal would supercharge Tehran’s hacking brigade. But when they showed their data to U.S. intelligence analysts, they were told to get lost.

Ex-US Intelligence Officer Worries About Russia-China Cyber Security Pact

The recently signed cyber security pact between Russia and China is a cause for concern, former Chairman of the US House Intelligence Committee Mike Rogers told Sputnik on Tuesday.

Defenders Unite Against Cyber Threats In Healthcare

The screenshot above is courtesy of Norse ? a cyber intelligence company that uses their global sensor network to track cyber threats around the world ? in real time (online here).  Warning ? this global view can be a tad mesmerizing if you haven't seen it. There's no audio, but it's [...]

A Match Made In Heaven--Lockheed Martin Partners With Cybereason

3 months agoTechnology : Forbes: Tech

Cybereason is a cyber security company that was founded by ex-members of Israel's crack intelligence agency's cybersecurity unit 8200. 8200 is perhaps the biggest creator of security startups - ex unit members are behind an increasingly large number of successful security companies. Borne from their work at 8200 handling some [...]

'NCIS' Season 12: Episode 22 Recap 'Troll'

This week on 'NCIS', Special Agent Ned Dorneget from NCIS cyber operations helps the team when a Navy ensign who worked in the Office of Naval Intelligence is murdered. Also, the team discovers that Jake and Gibbs have become good friends.

Danger: GOP House’s “Cybersecurity Bills” are Surveillance Bills in Disguise

By Mark Jaycox | (Electronic Frontier Foundation) | – The House passed two cybersecurity “information sharing” bills today: the House Permanent Select Committee on Intelligence’s Protecting Cyber Networks Act, and the House…

Signature-based Intelligence Resulted In Tragedy: A Lesson For Cyber Intel Consumers

The New York Times reported yesterday that a drone strike mean't to kill four Al Qaeda terrorists also killed two hostages that no one knew were there. This tragedy also revealed that drone operators rely upon signatures to form a "guesstimate" of the target.In Pakistan, unlike elsewhere in the world, the White House permits the C.I.A. Show More Summary

Raytheon to Plow $1.7 Billion Into New Cyber Venture

Raytheon is betting it can leverage the cybersecurity skills it honed for the U.S. military and intelligence agencies to sell to banks and retailers, investing almost $1.7 billion to establish a stand-alone cyber business.

Oregon Man Dares Obama To Arrest Him For Giving Bitcoin To Edward Snowden

An Oregon software programmer is calling on President Barrack Obama to arrest him for possibly violating an executive order which the 27-year-old believes prohibits citizens from providing cyber currency to intelligence leaker Edward Snowden.

Dead Spying Legislation Returns With Help from Big Business (Video)

4 months agoNews : Truthdig

Mataparda (CC BY 2.0) The Cyber Intelligence Sharing and Protection Act failed after Edward Snowden’s revelations of mass government spying. But today it’s back, largely unchanged, as the Cybersecurity Information Sharing Act—and President...Show More Summary

Copyright © 2015 Regator, LLC