GOVERNMENT > Law Enforcement


« Back to News

2018-03-12

Cyber Criminals Catch Up With Nation-States

The trickle-down effect of advanced “military-grade” tools is seeing the gap between cyber-criminal & nation state attack capabilities closing.

2018-03-07

Preventing The Next Active Shooter Attack

Police need new security tools to detect concealed weapons and prevent the types of mass shootings that seem to be endemic to US culture.

2018-02-26

Cybercrime Costs Over $600 Billion Annually

Cybercrime is having an economic impact with significant ramifications toward things like jobs, opportunity, investment and innovation.

2018-02-23

Police Prepare for Cyber Attacks

Canada is heightening its cybersecuity defenses across the board, not least in its regional police forces.

2018-02-21

Chinese Police Wearing Face Recognition Glasses

Chinese police are now wearing sunglasses equipped with facial-recognition technology connected to a database of criminal suspects.

2018-02-20

Flight Ticket Fraud Alert

Fraudsters are attempting to entice UK victims who are looking for cheap flights abroad to Africa and the M East with fake online tickets.

2018-02-14

Girls Are Future Cybercrime Fighters

There are many career opportunities for girls in cybersecurity, but only 11 percent of the world's information security workforce are women.

2018-02-09

Infraud Cybercrime Site: Dozens Arrested

A premier online destination for the purchase and sale of stolen property worth $500m and using the slogan "In Fraud We Trust" has been taken down.

2018-01-31

World's Biggest Ever Digital Currency Theft

One of Japan's largest digital currency exchanges says it has lost some $534m (£380m) worth of virtual money in a hacking attack on its network.

2018-02-07

High Tech Police Tool Up For Winter Olympics

S. Korea is planning to deploy 10,000 police officers in and around Pyeongchang to protect the events against cyber attacks & other disruption.

2018-02-07

Drones: A Crowd-Management Solution

India is working on crowd-management solutions in public places using drones for both crowd management and infrastructure inspection.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.