GOVERNMENT > Law Enforcement


« Back to News

2018-10-02

How To Hack the Hackers: The Human Side Of Cybercrime

As cyber-attacks grow more sophisticated, those who defend against them are using behavioural science to understand perpetrators and victims.

2018-10-02

Machine Learning Algorithms & Police Decision-Making

Use of machine learning in police decision-making is in its infancy and the impact of algorithms on police officers’ actions is poorly understood.

2018-10-01

Smartphones Are Working For Dutch Police

The Dutch National Police issued its officers and staff with 63,000 smartphones, creating numerous opportunities to do things differently.

2018-09-26

New Phishing Attack Uses An Old Trick

A new phishing campaign is using an old trick by claiming to offer a tax refund which can only be claimed online.

2018-09-24

Chinese Cybercrime Group Launches Destructive Malware Family

Destructive malware pretends to ask for ransom, but in fact steals and deletes victims’ data as it self-propagates itself, searching for new targets.

2018-09-24

Europol Warning: 15 Ways To Become A Cybercrime Victim

From ransomware through to cryptocurrency scams, Europol says it wants to stop criminals from making you a victim.

2018-09-20

Keeping Young People Off The Dark Web

UK police are looking for cybersecurity firms to help implement a strategy of steering youngsters away from a life in online crime.

2018-09-17

Cyber Criminals Are Outspending Business

The cybercrime community spends over $1tn each year developing attacks, compared with the $96bn spent by organisations on security from attacks.

2018-09-12

UK Victims Lose £28m To Cybercrime In 6 Months

Cybercrime is often committed by criminals who never come into contact with their victim, about half of all fraud & cybercrime comes from abroad.

2018-09-03

What Europe Can Do To Catch Dark Web Criminals

Europe gets serious about fighting crime schemes hatched on the dark web, the home of hackers, pedophiles, terrorists, and other undesirables.

2018-09-04

Training Young Hackers To Stop Cybercrime

British police chiefs and intelligence officers hope that young people will become their latest recruits in the rapidly evolving cyber war.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.