GOVERNMENT > Law Enforcement


« Back to News

2018-05-09

Re-Thinking The Threat Of Ransomware

Where did ransomware come from, how is it evolving and, most importantly, what steps can organisations take to protect against it?

2018-05-08

Blockchain Will Radically Transform Anti-Fraud

Blockchain's distributed ledger technology is ideal for meeting government data rules (GDPR) and serving as a trusted tool for identity verification.

2018-04-26

Website Linked To Attacks On UK Banks Is Shut Down

DDOS For Hire: A website linked to more than 4m cyber attacks worldwide, including against some of Britain’s biggest banks, has been shut down.

2018-04-25

The Apps That Map Violence

Residents of Rio de Janeiro are flocking to use crowdsourcing apps and following the social network pages of crime-watch groups for safety.

2018-04-30

The Impact Of Cybercrime On UK Business

Government figures for 2017 reveal that almost half of all UK firms were hit by a cyber breach or attack in the previous year, costing £11 billion.

2018-04-04

Police Arrest Bank Hacker Who Stole $1B

The leader of the gang behind Carbanak and Cobalt malware who attacked over 100 financial institutions worldwide has been arrested.

2018-04-24

Canadian Police Uncover Dark Net Gun Market

Police around the world are not really addressing crime of the Dark Net, but in Canada the Mounties are focused on hunting for illicit guns.

2018-04-13

Cyber Criminals Have Ingenious Money Laundering Methods

Cyber criminals are using a combination of cryptocurrencies, gaming currencies and micro-payments to launder $200bn of stolen money.

2018-04-13

UK Police Cybercrime Training

British police have spent a measly £1.3m on cybercrime training for officers in the last three years, yet cyber skills are vital for modern policing.

2018-04-12

Police Stab Vest Detects Injury

Wearable technologies containing sensors can save lives. A smart police vest can detect an injury automatically and send an alert for help.

2018-04-12

How to Access the Dark Web Anonymously

Are you trying to find out how to access the dark web? You will need an anoymising browser, but its unreliable, slow and you might not like it.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.