Last night's episode of Intelligence had its flaws – my god, how awful is Cyber Com's security? – but I will forgive those because this was the first time the show delivered solid entertainment, on purpose. Right up until Riley's little speech at the end. Read more...
Majority of American companies view targeted cyber attack as a top 3 business risk. Organized groups of fraudsters viewed as presenting greatest cyber threat. Grasp of vulnerabilities and threat intelligence named as best tools to help Boards tackle threat BAE […]
The debate over the National Security Agency's cyber surveillance and collection of telephone records should lead to a better balance between rights of privacy and requirements of foreign intelligence. But whatever the outcome of that...Show More Summary
UK intelligence once gave Anonymous and LulzSec a taste of its own medicine, hitting them with the exact kind of cyber attack they're infamous for employing, according to a new leak from Edward Snowden obtained by NBC News. A secret British intelligence outfit known as JTRIG (the Joint Threat Research...
At Wednesday's Senate Intelligence Committee hearing, titled "Global Security Threats," Senators Ron Wyden (D-Ore.) and Mark Udall (D-Colo.) hinted that CIA agents might be engaging in abusive cyber operations against Americans. AndShow More Summary
The former deputy director for cyber defense operations at the U.K.'s signals intelligence agency has made the leap to the private sector, heading up a firm with an unusual approach to network security.
Cincinnati Bell's CBTS business services subsidiary is giving its business customers another tool to thwart cyberattacks with the debut of its Threat Intelligence Center in Cincinnati.
James Clapper, the director of national intelligence, listed "insider threats," alongside cyber attacks and terrorism. This marks the first time unauthorized disclosures are given such prominence in a threat assessment report.
E-H AWK, cyber intelligence provider focused on combating fraudulent sign ups, has released the Vetting API Connector. The API automates the various vetting tools E-HAWK has deployed to analyze sign ups to determine the risk of fraud. Show More Summary
LONDON (Reuters) - BAE Systems is changing the name of its cyber security unit from Detica to BAE Applied Intelligence, in a rebranding move to court more commercial customers alongside its traditional government client base.
'Lost' actor Josh Holloway stars in new CBS drama with a cyber twist read more
IN JUNE the Intelligence and Security Committee, a group of British parliamentarians, published a stern report. It concerned the Huawei Cyber Security Evaluation Centre, at Banbury in Oxfordshire, where telecoms-network equipment supplied by the Chinese company is tested to alleviate any worries that its customers (or the state) may have. Show More Summary
Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threatened ties between erstwhile imperial allies.
NEW YORK (Reuters) - A Chicago computer hacker tied to the group known as Anonymous was sentenced on Friday to 10 years in prison for cyber attacks on various government agencies and businesses, including a global intelligence compa...
LOS ANGELES (Reuters) - Los Angeles Mayor Eric Garcetti, citing warnings by President Barack Obama and National Intelligence Director James Clapper about the threat of attacks on computer networks, on Wednesday announced the creation of the city's firs...
Trustworthy Computing released volume 15 of the Microsoft Security Intelligence Report, which provides threat intelligence and analysis of cyber threats in over 100 countries and regions worldwide on Tuesday. “Among the numerous keyShow More Summary
Washington (CNN) - The Republican head of the House Intelligence Committee said Sunday that problems with the Obamacare website might leave its potential consumers at risk of identity theft and other cyber crimes. The website, which is supposed to service enrollees in President Barack Obama's signature health care program, came under fire in congressional hearings […]
After managing one of the largest cyber intelligence operations in the world, former National Security Agency boss Michael Haden experienced how the other half lives while aboard the Amtrak Acela commuter train. As Hayden provided unnamed...Show More Summary
This summer, when Edward Snowden dropped his bombshell about PRISM, the NSA's vast Internet spying program, the House had recently passed a bill called the Cyber Intelligence Sharing and Protection Act (CISPA). Widely criticized by privacy...Show More Summary
Ian Wallace is a visiting fellow in the Center for 21st Century Security and Intelligence at the Brookings Institution and previously a senior official at the British Ministry of Defence, where he helped develop UK cyber strategy. I'm...Show More Summary