GOVERNMENT > Law Enforcement


« Back to News

2017-10-02

Local Government Computer Systems Are Soft Targets

Even a small vulnerability can lead to big problems. A hack affecting NY state police illustrates the vulnerability of local government networks.

2017-09-15

Cybercrime In The EU - Where Are You Safe?

Website Builder Expert recently conducted research into just how vulnerable computer users in the EU are to cybercrime. There are some surprises.

2017-09-14

FBI Wants To Ditch Kaspersky

The FBI seem to think the Kaspersky cybersecurity company is a Russian stooge that can't be trusted with protecting America's critical infrastructure.

2017-09-23

US Police Real-Time Mapping Of Terrorist Attacks

A new technology for police and other first-responders supplies a real-time mapping capability to deal with active shooting attacks.

2017-09-18

Wearable Sensor Tech For Beat Police Officers

A new wearable sensor technology named Automatic Injury Detection (AID) provides on the spot rescue alerts when a police officer needs help.

2017-09-19

Canadian University Hit For $12m Phishing Scam

MacEwan University said its IT systems are secure after the institution was defrauded of nearly $12 million in a phishing scam, compounded by human error.

2017-09-14

Brit Accused of Bank Cyber Attacks

A British / Israeli man accused of launching cyberattacks against two of the UK's largest banks has appeared in court.

2017-09-12

Disastrous Equifax Breach Exposes 44% Of The US Population

Executives run for cover as credit reporting giant Equifax loses the confidential data of 143m users to criminal hackers.

2017-09-11

Police Spy On Their Own: Twitter Accounts Scrutinised

Revealed: A year-long probe into the anonymous Twitter accounts of officers of the Police Service of Northern Ireland (PSNI).

2017-09-08

Crime Has Become Cybercrime

'Ordinary' criminals are making an easy transition to becoming cybercriminals and are beginning to remodel their organizations for greater efficiency.

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.