GOVERNMENT > Law Enforcement


« Back to News

2016-03-22

ISIS Hackers Publish US Police Officers’ Private Details

ISIS hackers have posted personal details of US officials online, encouraging the group’s supporters to carry out “lone wolf” attacks.

2016-03-23

Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack an iPhone has Americans divided into two camps.

2016-03-23

Is Apple Right To Resist The FBI?

The FBI wants Apple to do something no private company has ever been forced to do: break its own technology.

2016-03-23

China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States.

2016-03-18

Why Do We Fall For Online Scams?

Scams are big business. It is becoming increasingly difficult to keep up with the range of scenarios being used to con people out of their money.

2016-03-15

Who Is Winning The Cyber War?

Who is winning the cyber war - the criminals and hackers or the network and system defenders? The State of Cybersecurity: 2016.

2016-03-11

Apple’s Best Defence Against The FBI Is The One It Can’t Admit

Some say the debate over privacy embodied in Apple v FBI conceals the problem that iPhone already has backdoors which Apple hasn’t yet closed.

2016-03-18

UK Bosses - Heads In The Sand Over Cybercrime

Clear evidence of the growing threat is still not causing British businesses leaders to increase their protection.

2016-03-08

Cyber Criminals Have Evolving Tactics

The financial world should be bracing itself for what is set to be a big year for cyber-crime, according to ThreatMetrix's new report.

2016-03-07

Apple v FBI: The US Debates Privacy

Is there such a thing as security that is so good that it's a danger to society?

2016-02-29

Retailers Are Hardest Hit by Malware

Those in the retail sector who have not yet suffered a breach may see one in the near future.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

TekStream Solutions

TekStream Solutions

TekStream accelerates clients’ digital transformation by navigating complex technology environments with a combination of technical expertise and staffing solutions.