GOVERNMENT > Law Enforcement


« Back to News

2015-02-11

UK Police: 'Innocent people' on unregulated photo database

Police forces in England and Wales have uploaded up to 18 million "mugshots" to a facial recognition database. This is despite a court ruling it could be unlawful. They include photos of people never charged, or others cleared of an offence, and were uploaded without Home Office approval.

2015-02-05

FBI access to PRISM surveillance program expands

US Federal Bureau of Investigation (FBI) access to overseas surveillance collected by the National Security Agency (NSA) has expanded in recent years, with the law enforcement agency gaining access to collected, but unprocessed data, in 2009, according to a report released by the government.

2015-02-05

Apple iOS Backdoor: Snowden says iPhone is a Government Spy

Infamous former NSA contractor Edward Snowden thinks that Apple's iPhone has "unique computer software" that authorities can activate remotely to be in a position to gather information about the user.

2015-01-19

Dark Web thrives despite Operation Onymous

There is a part of the web that is still hidden from the majority of the Internet users, a so-called dark web that cannot be found by conventional search engines or accessed by standard browsers.

2015-01-08

FBI briefed on alternate Sony hack theory

FBI agents who are investigating the Sony Pictures hack were briefed recently by a security firm that says its research on the attacks points to laid-off Sony staff and not to North Korea, as the perpetrator.

2015-01-15

Cybercrime? Blogger gets Flogged for ‘Insult to Islam’

A Saudi Arabian blogger has been publicly flogged after being convicted of cybercrime and insulting Islam, reports say.

2014-05-06

Most UK Police Forces don’t investigate Cyber Crime

Ninety Percent of the UK’s Police have no Tactical or Strategic plans for monitoring, training PCs and reducing cyber crime.

2014-06-12

Worlwide Crackdown on Hackers

Two major events targeting Hackers show growing international concern across governments over the growing impact and extent of Cybercrime.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Searchlight Security

Searchlight Security

Searchlight Security is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.