The National Security Agency updated guidance to help federal agencies choose secure collaboration services, changing its determination of whether a number of products offered end-to-end encryption and other security features.
Topic: National Security Agency (NSA)
In an effort to better protect the U.S. defense industrial base from malware-based threats, the National Security Agency has launched a pilot program on securing Domain Name System use for U.S. defense contractors.
The NSA has raised the alarm over what it says is Russia's active exploitation of a remote-code execution flaw in Exim for which a patch exists.
One of the National Security Agency's newly minted Cybersecurity Directorate's goals is to quickly share information on adversarial threats with the private sector - but the process for doing that needs to be refined, the directorate's leader said Thursday.
The National Security Agency is creating a Cybersecurity Directorate to better protect the country against cyberthreats from foreign adversaries, NSA Director Gen. Paul Nakasone said Tuesday.
The EternalBlue hacking exploit, already used in the infamous WannaCry and NotPetya attacks, has now surfaced in the NSA's own backyard, says The New York Times.
A leading cybersecurity firm found evidence Chinese intelligence operatives repurposed National Security Agency (NSA) hacking technology in 2016 to attack American allies and private firms in Europe and Asia, according to The New York Times.
Program that analyzed Americans' calls and texts has become too burdensome, sources tell The Wall Street Journal.
The NSA has released GHIDRA, an advanced cybersecurity tool to the open source world. Unlike the tools previously nicked from the NSA, Ghidra is a more benevolent tool. It's designed to effectively reverse engineer so-called compiled and deployed code and then decompile it into logic that code-savvy humans can understand.
The Science of Security and Privacy (SoS) Initiative, sponsored by the National Security Agency Research Directorate, fosters a self-sustaining, open, and public security science research community to discover key cyber principles necessary to support improved explanations, predictions and confirmation or validation of predicted outcomes. The discipline of