Ghidra Roars into World Recognition! nsa.gov/News-Features/News-Sto The open source version of Ghidra, the NSA Research-developed software reverse engineering (SRE) framework, was awarded the highly-acclaimed 2019 R&D 100 Award! Ghidra was created in the late 1990s and has been a longstanding contributor to NSA’s Cybersecurity mission. With its public release, Ghidra’s sphere of influence has dramatically...

History highlight: World War II cryptologist serving in the Women's Army Corps nsa.gov/News-Features/News-Sto President Trump recently declared November as National Veterans and Military Families month. This month, the National Security Agency has featured a short history series that highlights the contributions of some lesser known cryptologic heroes. This week is the final segment in our three-part...

History highlight: A living language resource nsa.gov/News-Features/News-Sto National Veterans and Military Families month article about World War II linguist Clarence Yamagata.

NSA Inspires the Girl Scouts on Their Way to the Moon nsa.gov/News-Features/News-Sto On 19 October, more than 250 Girl Scouts gathered in Hunt Valley, Md. to put their leadership and cybersecurity skills to the test at the inaugural Girl Scouts Cyber Challenge. Their quest was clear: The world’s first moon colony had been hacked, and now they must form an incident response team to determine who hacked their...

History highlight: Not a job for a nervous man nsa.gov/News-Features/News-Sto Article highlighting the story of a World War I radio intercept operator in honor of National Veterans and Military Families month 2019.

Four Celebrated in Cryptologic Hall of Honor Ceremony nsa.gov/News-Features/News-Sto The National Security Agency celebrated its 67th birthday Monday, November 4 by honoring four

We're Not Bots - People Solving Hard Problems nsa.gov/News-Features/News-Sto Keppel Wood recently joined the new Cybersecurity Directorate as the Chief Operations Officer of the Cybersecurity Collaboration Center- 3C for short. “Your network is only as secure as its last patch or latest update, at speed,” says Keppel, who considers herself a computer nerd at heart.

There Are Zombies in Our Midst nsa.gov/News-Features/News-Sto As smart devices replace static devices, complications arise when it comes to security. For instance, a smart phone has a lifecycle of about two years, in part because companies stop supporting older devices in lieu of updated operating systems, hardware, and new technology developments. Companies are also perpetually looking to sell customers...

We’re Not Bots – We’re Ohana nsa.gov/News-Features/News-Sto What’s unique about National Security Agency Hawai’i is not only the palm trees and never-ending sunshine, it’s the fact that they’re collocated with their primary customer, the U.S. Indo-Pacific Command. In short, they’re one big Ohana. That’s Hawaiian for family, which is what keeps G Galloway (known as “G”) excited to come to work every day.

NSA Article - Innovation and Diversity - We want to see you in Honolulu! nsa.gov/News-Features/News-Sto Innovation drives the success of NSA mission, and the diversity of NSA’s workforce fosters that innovation through ideas and contributions of individuals from different backgrounds.

We’re Not Bots: Bots Can’t Build Partnerships nsa.gov/News-Features/News-Sto Training the next generation of cyber talent is Emily Fox’s passion. She wears many hats, serving as NSA’s DevOps security lead, a volunteer with NSA’s K-12 STEM programs, open source contributor, and Girl Scout leader. In every role, Fox’s goal is to inform and educate the next generation of women in technology.

Creating and Cracking NSA’s Codebreaker Challenge nsa.gov/News-Features/News-Sto More than 100 students packed into a classroom at Oregon State University (OSU) recently to get unique insight into NSA’s Codebreaker Challenge from its creator, Eric Bryant.

NSA Cybersecurity Advisory: Malicious Cyber Actors Leveraging VPN Vulnerabilities for Attack; Check VPN Products for Upgrade nsa.gov/News-Features/News-Sto The National Security Agency is alerting that multiple Advanced Persistent Threat (APT) actors are currently exploiting various VPN vulnerabilities to gain access to unprotected networks.

NSA Employee Satisfaction Continues to Rise nsa.gov/News-Features/News-Sto The results from this year’s Intelligence Community (IC) Climate Survey show the people who work at NSA are dedicated- saying they are constantly looking for ways to do their jobs better, to collaborate with each other, and enjoy work-life balance.

NSA Launches Latest Codebreaker Challenge nsa.gov/News-Features/News-Sto Article about NSA launching its 20 September 2019 to 10 January 2010 Codebreaker Challenge competition for students at U.S. based academic institutions.

NSA and UH Mānoa: Partnering to Produce the Talent and Tools for Tomorrow nsa.gov/News-Features/News-Sto Over the past 12 years, NSA and UH Mānoa have partnered to work on hard mission problems and educate the workforce of the future both in language and cybersecurity. The partnership began in 2007 when UH Mānoa started offering NSA employees – particularly military members – specialized courses in...

Time to Sharpen Pencils and Change Passwords nsa.gov/News-Features/News-Sto Article reminding parents and students to follow best cybersecurity practices as students return to school in the fall.

NSA Hosts Top Pentagon Enlisted Leaders to Showcase Mission nsa.gov/News-Features/News-Sto U.S. Cyber Command (USCYBERCOM) and National Security Agency (NSA) showcased their partnership at the annual Defense Senior Enlisted Leader Conference July 23, 2019. Twenty of the Pentagon’s top enlisted leaders converged at the agency’s new Integrated Cyber Center to engage in forums centered on national defense...

Four Cryptologic Giants will be Inducted into the Cryptologic Hall of Honor nsa.gov/News-Features/News-Sto The Center for Cryptologic History and Strategic Communications are pleased to announce the 2019 induction of four cryptologic forerunners into the Cryptologic Hall of Honor.

Show more
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!