GOVERNMENT > Law Enforcement


« Back to News

2015-10-28

Germany Will Make Telecoms Companies Disclose Data To Police.

Despite two previous laws having been ruled unconstitutional, data retention is back in Germany.

2015-10-26

Your Personal Safety. There’s An App For That

A crowd sourced App that enables you to reach out for help to other users nearby.

2015-10-27

UK Cybercrime & Online Fraud on the Rise

The changing face of crime in Britain has been underlined by new official data showing the growing threat of cyber crime and online fraud.

2015-10-30

FBI Say ISIS Is Going After US Vulnerabilities

The big underlying concern is a cyber attack on the power grid & other critical infrastructure.

2015-10-20

Deep Web – CyberCrime, The Movie

A new documentary film gives the inside story of the arrest of Ross William Ulbricht, the man behind Silk Road cybercrime website.

2015-10-23

The World's First Hack: the Telegraph and the Invention of Cyber Privacy

Concern over personal data interception did not start with GCHQ and the NSA, hacking can be traced all the way back to the 19th century

2015-10-21

US Concerns Over Kremlin Links to Cyber Gangs

Moscow has long been known to source its technology, world-class hacking talent and intelligence information from cyber crime rings.

2015-10-20

The Dark Web Uncovered

Intel Security shines a light on the shadowy world of Dark Web cybercrime markets. Far from being hidden away, these markets are easy to find.

2015-10-23

Cyberattack: Millions Stolen From UK Bank Accounts

Dridex: Computers become infected with the virus when users receive and open documents in seemingly legitimate emails

2015-10-18

Australia Begins Mass Data Retention

Including metadata on who called or texted whom for how long. location, volume of data exchanged, device information & email IP data.

2015-10-23

UK Crime Rate Soars as CyberCrime Included

Crime rate doubles to more than 11.6m offences due to the novel inclusion of online fraud incidents and cybercrime offences.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.