GOVERNMENT > Law Enforcement


« Back to News

2017-12-12

Bitcoin: UK And EU Will Crackdown On Crime & Tax Evasion.

Traders will have to disclose their identities, ending the anonymity that has made the currency attractive for drug dealing & other illegal activities.

2017-12-04

British Police Lose Phone & Web Search Powers

Mass harvesting of personal communications data can only be considered lawful if accompanied by strong independent & judicial safeguards.

2017-12-01

What Is the Dark Web? Can You Access It?

Careful: The Dark Web can be visited by anyone, but it is difficult to work out who is behind the sites & dangerous if your identity is discovered.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-30

Cyber Criminals Stealing Reward Points & Air-Miles

Russian-speaking countries pose the “number one cyber-crime threat to the UK” as cyber criminals focus on stealing victims' reward points & air-miles.

2017-11-23

Is Your Data Being Sold On The Dark Web?

Experts say the number of forums of interest to business cybersecurity professionals is actually quite small as a proportion of the total Dark Web.

2017-11-22

MI5 In The Clear Over Terror Attacks

An independent review clears MI5 & police of making mistakes that allowed terrorists to strike Britain and recommends a 'terror-spotting' algorithm.

2017-11-15

Bank Robbery: Cyber Criminals Steal $1Billion

Silence: A cybercrime gang is alleged to have stolen as much as $1 billion from financial organisations across Russia, Armenia & Malaysia

2017-11-03

M15 Issues A Threat Warning

MI5's Director General says that Britain is facing an unrelenting offensive from a growing pool of UK jihadist extremists.

2017-11-06

Criminalised: Watching Terrorist Propaganda Online

Watching streamed extremist material online will be a criminal offence in Britain in plans to crackdown on terrorist propaganda.

2017-10-24

Cyber Criminals Threaten DDoS Attacks

… And email demands payment or criminals will take companies and their websites offline

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.