GOVERNMENT > Law Enforcement


« Back to News

2017-12-29

Intelligent & Autonomous Security Robots

A new artificial intelligence technology that gives security guard robots the ability to communicate & deploy jointly at the same patrol site.

2017-12-20

Russian Hackers Steal $10M From Banks

The MoneyTaker group broke into 20 systems, which includes 15 US lenders, targeting ATMs and Russia’s interbank money-transfer system.

2017-12-19

96 Hours To Pay Up Or Spider Ransomware Deletes Your Files

To avoid the Spider Virus Windows users should be cautious of encrypted documents that contain a message enabling macros.

2017-12-15

Cyber Criminals Are The New Mafia

New participants have transformed cybercrime from isolated, individual acts into pervasive, savage practices run by distinct groups.

2017-12-12

Cisco & INTERPOL: Working Against Cybercrime

INTERPOL and IT giant Cisco agree to share data for quick threat detection worldwide and prepare for potential future collaboration in training.

2017-12-12

Bitcoin: UK And EU Will Crackdown On Crime & Tax Evasion.

Traders will have to disclose their identities, ending the anonymity that has made the currency attractive for drug dealing & other illegal activities.

2017-12-04

British Police Lose Phone & Web Search Powers

Mass harvesting of personal communications data can only be considered lawful if accompanied by strong independent & judicial safeguards.

2017-12-01

What Is the Dark Web? Can You Access It?

Careful: The Dark Web can be visited by anyone, but it is difficult to work out who is behind the sites & dangerous if your identity is discovered.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-30

Cyber Criminals Stealing Reward Points & Air-Miles

Russian-speaking countries pose the “number one cyber-crime threat to the UK” as cyber criminals focus on stealing victims' reward points & air-miles.

2017-11-23

Is Your Data Being Sold On The Dark Web?

Experts say the number of forums of interest to business cybersecurity professionals is actually quite small as a proportion of the total Dark Web.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.