GOVERNMENT > Law Enforcement


« Back to News

2015-08-24

How Uber Could Help Change Spycraft

Social media is an indicator of developments that the intelligence apparatus would never previously have had access to.

2015-08-21

Fraudsters Steal $46.7m From Ubiquiti Networks

Business E-mail Compromise (BEC) scam: The incident involved employee impersonation and fraudulent requests from an outside entity.

2015-08-21

When Your White Hat Is Really a Black Hat

Can you really trust all the people working for your company (or hired contractors) to protect sensitive data?

2015-08-14

Predictive Policing Technology Arrests

An intelligence led computer programme that uses an algorithm to pin-point officers to zones where crime is most likely to occur.

2015-08-14

Twitter says U.S Government Want More User Account Information

Twitter reveals that requests for account information from governments has jumped 52%, mostly to do with criminal investigations.

2015-08-11

Inside the FBI Cyber Division

The biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

2015-08-10

Interpol is Training Police to Fight DarkNet Crime

Interopol run a five-day course on Tor hidden services, illegal marketplaces & crypto currencies to investigate crimes on the DarkNet.

2015-08-10

Cyber Extortion: A Growth Industry

The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Is it?

2015-08-04

SurfWatch Labs Rolls Out Dark Web Intelligence Service

SurfWatch collects sensitive cyber intelligence from the underground on threats relevant to a specific customer.

2015-08-04

For Ransom, Bitcoin Replaces the Bag of Bills

Criminals like the virtual currency because it can be held in a digital wallet & is not registered with any government or financial authority.

2015-08-04

Identity Access Management: Lessons From JPMorgan’s Insider Breaches

Another JPMorgan Chase & Co. employee arrested on charges of stealing customer data & trying to sell it for thousands of dollars.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

DEFENTEK - National Security Informatics

DEFENTEK - National Security Informatics

Defentek (aka National Security Informatics) is a technology consortium covering a broad spectrum of intelligence computing solutions and interception technologies.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.