GOVERNMENT > Law Enforcement


« Back to News

2017-12-01

What Is the Dark Web? Can You Access It?

Careful: The Dark Web can be visited by anyone, but it is difficult to work out who is behind the sites & dangerous if your identity is discovered.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-30

Cyber Criminals Stealing Reward Points & Air-Miles

Russian-speaking countries pose the “number one cyber-crime threat to the UK” as cyber criminals focus on stealing victims' reward points & air-miles.

2017-11-23

Is Your Data Being Sold On The Dark Web?

Experts say the number of forums of interest to business cybersecurity professionals is actually quite small as a proportion of the total Dark Web.

2017-11-22

MI5 In The Clear Over Terror Attacks

An independent review clears MI5 & police of making mistakes that allowed terrorists to strike Britain and recommends a 'terror-spotting' algorithm.

2017-11-15

Bank Robbery: Cyber Criminals Steal $1Billion

Silence: A cybercrime gang is alleged to have stolen as much as $1 billion from financial organisations across Russia, Armenia & Malaysia

2017-11-03

M15 Issues A Threat Warning

MI5's Director General says that Britain is facing an unrelenting offensive from a growing pool of UK jihadist extremists.

2017-11-06

Criminalised: Watching Terrorist Propaganda Online

Watching streamed extremist material online will be a criminal offence in Britain in plans to crackdown on terrorist propaganda.

2017-10-24

Cyber Criminals Threaten DDoS Attacks

… And email demands payment or criminals will take companies and their websites offline

2017-11-01

Big Data And Policing

Big data technology is revolutionising many domains, including the retail, healthcare and transportation sectors. Not so for British policing.

2017-10-20

Big Data In The Service of Police

Dragnet Surveillance & Predictive Policing: Big data analytics both amplifies and transforms police surveillance practices.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

SecureDApp

SecureDApp

SecureDApp is a blockchain security company that specialises in offering comprehensive security solutions to companies operating in the web3 space.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.

International Computer Services Inc (ICSI)

International Computer Services Inc (ICSI)

International Computer Services, Inc. (ICSI) specializes in providing managed IT services and consulting.