GOVERNMENT > Law Enforcement


« Back to News

2016-07-17

Dallas Shooting: US Police Robot Kills Suspect

Police’s lethal use of a bomb-disposal robot worries legal experts who say it creates gray area in use of deadly force by law enforcement.

2016-07-13

Ukrainian Hacker Pleads Guilty to US Insider Trading Charges

A Ukrainian man has pleaded guilty to his role in an insider trading scheme that netted more than $30 million (£20.8 million) in illicit profits.

2016-07-15

Infrastructure Security in the Age of Ransomware

Critical infrastructure including electric and water utilities are being temporarily shut down as ransomware plagues corporate systems.

2016-07-13

Global 'Terror Database' Leaked

The "terrorist database" World-Check used by global banks and intelligence agencies has been leaked.

2016-07-13

Companies Should Tackle Cybercrime & 'take the fight to the criminals'

Today’s cybercriminal often works for complex operations akin to businesses, with HR resources and R&D budgets.

2016-07-06

Is The Boom In Ransomware Stabilizing?

The criminal world appears to be fully incorporating ransomware into its business model.

2016-06-28

UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22%

British businesses have been rocked by a 22% increase in cyber-crime in the past year, losing over £1bn in the process.

2016-06-27

The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital. Opinion By Alfred Rolington

2016-06-28

Russian Cyber Gangs Linked To Bank Robberies

Investigators have linked malware used by Russian and eastern European cyber-gangs to a string of bank thefts perpetrated using SWIFT.

2016-06-30

For Sale: Access to 70,000 Hacked Computer Networks

Kaspersky has uncovered an online marketplace where criminals sell access to more than 70,000 hacked corporate & government servers for $6 each.

2016-06-27

British Companies Buy Bitcoins As Ransom Money

A cyber-security survey finds that one third of UK companies are buying Bitcoin in anticipation of ransomware attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Kinetic Investments

Kinetic Investments

Kinetic Investments provide entrepreneurs with the capital and support required to transform their vision into a success, in return for shared ownership of the company.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.