GOVERNMENT > Law Enforcement


« Back to News

2017-04-03

Would Killing Bitcoin End Ransomware?

Cybecriminals often demand payment in crypto-currency. Would ransomware attacks decrease or stop if Bitcoin ceased to exist?

2017-04-03

No Easy Fix For SME Cybersecurity

Small and medium sized businesses are frequent targets for cyber attacks and their results can be devastating.

2017-03-29

Google Search For A Fraud Victim

US judge orders Google to provide information on any internet user found to have searched for one of four variations of a fraud victim’s name.

2017-03-27

A Quick Tour Of Cybercrime’s Underground

The evolution of cybercrime has hit a peak with ransomware and Bitcoin. One of the strange features of this is how much of it is in public.

2017-03-15

New App Minimising Police Violence

A newly-developed app aims to allow both US police officer and driver to stay in their vehicles for routine traffic stops, injecting a level of safety for both parties.

2017-03-30

App To Alert Of Terrorist Attacks

A new terror alert smartphone app released worldwide providing users real-time information during a terrorist attack.

2017-03-07

Emergency Connection-Teachers and Police

Statistics show it’s in the first couple of minutes of an attack scenario or threat that people get hurt or injured. In recent years, schools in the US have become a frequent target.

2017-04-07

Facial Recognition Technologies

US Homeland Security is rushing to equip airports with biometric security systems, including sophisticated facial recognition software.

2017-03-01

Bitcoin Is Increasing Ransom Attacks

There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk.

2017-02-21

Murderer's girlfriend got Police job to access files

A woman who got a job at UK’s Hammersmith Police station so she could data track a witness whose evidence helped convict her gangster boyfriend of murder has been jailed.

2017-02-21

Italy's Foreign Ministry under Cyber Attack

Italy's foreign ministry was hacked last year, a source close to the department said recently, confirming a report in the Guardian newspaper which also said Russia was suspected of perpetrating the attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.