GOVERNMENT > Law Enforcement


« Back to News

2016-07-19

UK IP Bill Will Allow Government To Spy On Journalists

The Investigatory Powers Bill will allow the UK Intelligence services and Police to monitor and access journalist Internet, phone & data records.

2016-07-17

Dallas Shooting: US Police Robot Kills Suspect

Police’s lethal use of a bomb-disposal robot worries legal experts who say it creates gray area in use of deadly force by law enforcement.

2016-07-13

Ukrainian Hacker Pleads Guilty to US Insider Trading Charges

A Ukrainian man has pleaded guilty to his role in an insider trading scheme that netted more than $30 million (£20.8 million) in illicit profits.

2016-07-15

Infrastructure Security in the Age of Ransomware

Critical infrastructure including electric and water utilities are being temporarily shut down as ransomware plagues corporate systems.

2016-07-13

Global 'Terror Database' Leaked

The "terrorist database" World-Check used by global banks and intelligence agencies has been leaked.

2016-07-13

Companies Should Tackle Cybercrime & 'take the fight to the criminals'

Today’s cybercriminal often works for complex operations akin to businesses, with HR resources and R&D budgets.

2016-07-06

Is The Boom In Ransomware Stabilizing?

The criminal world appears to be fully incorporating ransomware into its business model.

2016-06-28

UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22%

British businesses have been rocked by a 22% increase in cyber-crime in the past year, losing over £1bn in the process.

2016-06-27

The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital. Opinion By Alfred Rolington

2016-06-28

Russian Cyber Gangs Linked To Bank Robberies

Investigators have linked malware used by Russian and eastern European cyber-gangs to a string of bank thefts perpetrated using SWIFT.

2016-06-30

For Sale: Access to 70,000 Hacked Computer Networks

Kaspersky has uncovered an online marketplace where criminals sell access to more than 70,000 hacked corporate & government servers for $6 each.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.