GOVERNMENT > Law Enforcement


« Back to News

2017-05-08

Interpol Located & Shut Down 9,000 Command Servers

An investigation conducted by Interpol resulted in the identification of nearly 9,000 compromised control servers located in Asia.

2017-05-10

Terrorism Prevention & Border Protection – New Face Recognition Platform

Using unique feature recognition capabilities, FaceFirst's new airport security platform identifies visitors in high traffic areas.

2017-05-08

Police Take To The Air With Connectivity

Highly secure internet connectivity lets US Police tactical flight officers connect to communications systems and databases while airborne.

2017-05-03

Hacker Holds Netflix To Ransom

A hacker claims to have stolen the upcoming season of Netflix’s hit series 'Orange is the New Black' and is demanding a ransom payment.

2017-05-02

Technology Can Not Diminish Insider Threats By Itself

The key to reducing insider threats lies in understanding the individual’s mindset and having robust monitoring on that person's systems & data.

2017-05-02

Ten Myths About Cybercrime

Don't let cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organisation from attack.

2017-05-01

Teenagers And Cybercrime

More teenagers are getting involved in cybercrime. Many do it for fun without realising the consequences, but the penalties can be severe.

2017-04-27

Fake Police Ransomware Scam

Cyber criminals used JavaScript to trick Apple Safari web users into believing that their devices were compromised by police ransomware.

2017-04-25

The New Face of Cybersecurity

Phishing, spear-phishing, whaling, ransomware, hacking, hacktivism, corporate espionage. Attacks are becoming more insidious and sophisticated.

2017-04-25

UK Airports & Nuclear Power Stations On Cybersecurity Alert

UK security services have issued a series of alerts warning that terrorists may have developed ways of bypassing safety checks.

2017-04-24

Targeted Ransomware Attacks Are Focusing On Business

Cyber criminals are increasingly turning their attention from attacks against private users to targeted ransomware attacks against businesses.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.