December 7, 2023
Via: The RegisterAustralia is building a top-secret cloud to host intelligence data and share it with the US and UK, which have their own clouds built for the same purpose. The three clouds were discussed on Monday by Andrew Shearer, Australia’s director-general […]
November 6, 2023
Via: SecureWorldIn the interconnected digital landscape, vast amounts of valuable intelligence can be gleaned from publicly available open sources on the internet. Enter open-source intelligence (OSINT), the practice of legally collecting, analyzing, and making decisions based on public data. OSINT provides […]
February 12, 2020
Via: Security AffairsAccording to a joint report published by Germany’s ZDF public broadcaster and The Washington Post the Swiss-based firm Crypto AG was operating for CIA and the German Intelligence agency providing them with access to encrypted communications of more than 120 […]
June 6, 2019
Via: Help Net SecurityIn the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be obvious, they can also create […]
Cyber warfare, Network security
February 5, 2019
Via: Security IntelligenceWhen a client asked me to help build a cyberthreat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking for some rudimentary templates with a good outline for building […]
February 12, 2018
Via: The HillAmerican intelligence officials have been conducting a top-secret operation to recover stolen National Security Agency (NSA) documents through meetings with Russian intermediaries, according to The Intercept. Top members of the intelligence community have met over the past year with a […]
October 16, 2017
Via: Dark ReadingToday’s security environment is complex, ever changing, and sometimes even political. Many organizations struggle to keep current about the cyber threats they face. This is due to a number of issues, ranging from the failure to adapt security recommendations to […]
October 10, 2016
Via: Computer WeeklyThe information security industry is not approaching awareness in a way that has a positive effect on user behavior, according to independent cyber security consultant Jessica Barker. “The security industry is letting people down in raising awareness in a way […]
July 29, 2016
Via: Help Net SecurityIronscales, a multi-layered phishing mitigation solution that combines human intelligence with machine learning, today announced the launch of Federation, a product that will automatically and anonymously share phishing attack intelligence with organizations worldwide. “Instantaneous sharing of phishing attack intelligence will […]
September 28, 2015
Via: hacker#intelligence leaders are worried that the next front in malicious cyber activity will be efforts to deliberately manipulate data, altering a hacked system in such a way that users will unwittingly rely on false #information. It’s the kind of hack […]
June 25, 2015
Via: network-securityNorse has announced it will showcase its latest live attack cybersecurity solutions at Booth 359 at the BlackHat Conference, August 5-6 in the Mandalay Bay Hotel in Las Vegas. Norse provides enterprise security professionals with immediate and actionable information to […]
April 17, 2024