GOVERNMENT > Law Enforcement


« Back to News

2018-04-12

Police Stab Vest Detects Injury

Wearable technologies containing sensors can save lives. A smart police vest can detect an injury automatically and send an alert for help.

2018-04-12

How to Access the Dark Web Anonymously

Are you trying to find out how to access the dark web? You will need an anoymising browser, but its unreliable, slow and you might not like it.

2018-04-04

Europol Chief Moves to Deloitte

Exec.Director Rob Wainwright is leaving the EU police intelligence agency to run Deloitte’s cybersecurity practice.

2018-04-05

Inside the Big Business Of Cyber Crime

Just as big businesses operate based on regulations, the laws of supply and demand and even customer reviews, so does the black market.

2018-03-26

Petty Criminals Have Use Of Sophisticated Hacking Tools

The experts at Cyberint say that hackers have started using sophisticated hacking tools and techniques once used only by nation states.

2018-03-26

UK Police Helping Business Fight Cyber Attacks

London's Metropolitan Police offer an innovative new exercise that teaches business leaders how to protect their companies from cyber-attacks.

2018-03-22

Cybercrime Costs Londoners £26m Every Month

Scotland Yard say Londoners are losing an average of £26 million a month in cyber attacks on the capital's businesses and citizens.

2018-03-20

Charities Are Vulnerable To Severe Cyber Attacks

The UK's National Cyber Security Centre is warning British charities could be at risk from a series of devastating cyber-attacks.

2018-03-22

Millennials More Likely To Fall Victim To Cybercrime

Millennials aged 20 - 29 are more likely to fall victim to online and phone-based scams than the 70-plus age group.

2018-03-19

Dark Web Fraud Undetectable By Police

Identity fraudsters are getting smarter, more organised and the police are finding it harder to track them down.

2018-03-16

UK Police Introduce Cyber Security Certification

Introducing the UK’s first police-backed cyber security certification scheme, a two stage process based on Cyber Essentials, to avoid online threats.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

ZainTech

ZainTech

Zaintech is a regional digital & ICT solutions provider offering comprehensive digital solutions and services to enterprise and government customers in the MENA region.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.